<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 20, 2026 at 4:41 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 13 May 2026 20:21:56 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/how-to-pick-an-emr-system-that-actually-works-for-your-practice/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/how-to-pick-an-emr-system-that-actually-works-for-your-practice/]]></link>
			<title>How to pick an EMR system that actually works for your practice</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:21:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42154-prometheus-remote-read-endpoint-allows-denial-of-service-via-crafted-snappy-payload/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42154-prometheus-remote-read-endpoint-allows-denial-of-service-via-crafted-snappy-payload/]]></link>
			<title>CVE-2026-42154 Prometheus: remote read endpoint allows denial of service via crafted snappy payload</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/5-ways-softphones-help-businesses-work-smarter/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/5-ways-softphones-help-businesses-work-smarter/]]></link>
			<title>5 Ways softphones help businesses work smarter</title>
			<pubDate><![CDATA[Tue, 19 May 2026 19:26:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/7-windows-11-features-smbs-should-use/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/7-windows-11-features-smbs-should-use/]]></link>
			<title>7 Windows 11 features SMBs should use</title>
			<pubDate><![CDATA[Tue, 19 May 2026 19:26:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6210-type-confusion-and-heap-buffer-overflow-in-qt-svg-marker-handling-causing-application-crash/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6210-type-confusion-and-heap-buffer-overflow-in-qt-svg-marker-handling-causing-application-crash/]]></link>
			<title>CVE-2026-6210 Type confusion and heap-buffer-overflow in Qt SVG marker handling causing application crash</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/elevating-search-rankings-through-smart-image-optimization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/elevating-search-rankings-through-smart-image-optimization/]]></link>
			<title>Elevating search rankings through smart image optimization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25833-mbed-tls-3-5-0-to-3-6-5-fixed-in-3-6-6-and-4-1-0-has-a-buffer-overflow-in-the-x509_inet_pton_ipv6-function/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25833-mbed-tls-3-5-0-to-3-6-5-fixed-in-3-6-6-and-4-1-0-has-a-buffer-overflow-in-the-x509_inet_pton_ipv6-function/]]></link>
			<title>CVE-2026-25833 Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x509_inet_pton_ipv6() function</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25834-mbed-tls-v3-3-0-up-to-3-6-5-and-4-0-0-allows-algorithm-downgrade/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25834-mbed-tls-v3-3-0-up-to-3-6-5-and-4-0-0-allows-algorithm-downgrade/]]></link>
			<title>CVE-2026-25834 Mbed TLS v3.3.0 up to 3.6.5 and 4.0.0 allows Algorithm Downgrade.</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42898-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42898-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></link>
			<title>CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34872-an-issue-was-discovered-in-mbed-tls-3-5-x-and-3-6-x-through-3-6-5-and-tf-psa-crypto-1-0-there-is-a-lack-of-contributory-behavior-in-ffdh-due-to-improper-input-validation-using-finite/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34872-an-issue-was-discovered-in-mbed-tls-3-5-x-and-3-6-x-through-3-6-5-and-tf-psa-crypto-1-0-there-is-a-lack-of-contributory-behavior-in-ffdh-due-to-improper-input-validation-using-finite/]]></link>
			<title>CVE-2026-34872 An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using finite-field Diffie-Hellman, the other party can force the shared secret into a small set of values (lack of contributory behavior). This is a problem for protocols that depend on contributory behavior (which is not the case for TLS). The attack can be carried by the peer, or depending on the protocol by an active network attacker (person in the middle).</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34871-an-issue-was-discovered-in-mbed-tls-before-3-6-6-and-4-x-before-4-1-0-and-tf-psa-crypto-before-1-1-0-there-is-a-predictable-seed-in-a-pseudo-random-number-generator-prng/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34871-an-issue-was-discovered-in-mbed-tls-before-3-6-6-and-4-x-before-4-1-0-and-tf-psa-crypto-before-1-1-0-there-is-a-predictable-seed-in-a-pseudo-random-number-generator-prng/]]></link>
			<title>CVE-2026-34871 An issue was discovered in Mbed TLS before 3.6.6 and 4.x before 4.1.0 and TF-PSA-Crypto before 1.1.0. There is a Predictable Seed in a Pseudo-Random Number Generator (PRNG).</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7210-the-expat-and-elementtree-parsers-use-insufficient-entropy-for-xml-hash-flooding-protection/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7210-the-expat-and-elementtree-parsers-use-insufficient-entropy-for-xml-hash-flooding-protection/]]></link>
			<title>CVE-2026-7210 The expat and elementtree parsers use insufficient entropy for XML hash-flooding protection</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34873-an-issue-was-discovered-in-mbed-tls-3-5-0-through-4-0-0-client-impersonation-can-occur-while-resuming-a-tls-1-3-session/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34873-an-issue-was-discovered-in-mbed-tls-3-5-0-through-4-0-0-client-impersonation-can-occur-while-resuming-a-tls-1-3-session/]]></link>
			<title>CVE-2026-34873 An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation can occur while resuming a TLS 1.3 session.</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41636-apache-thrift-node-js-skip-recursion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41636-apache-thrift-node-js-skip-recursion/]]></link>
			<title>CVE-2026-41636 Apache Thrift: Node.js skip() recursion</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43352-i3c-mipi-i3c-hci-correct-ring_ctrl_abort-handling-in-dma-dequeue/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43352-i3c-mipi-i3c-hci-correct-ring_ctrl_abort-handling-in-dma-dequeue/]]></link>
			<title>CVE-2026-43352 i3c: mipi-i3c-hci: Correct RING_CTRL_ABORT handling in DMA dequeue</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31717-ksmbd-validate-owner-of-durable-handle-on-reconnect/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31717-ksmbd-validate-owner-of-durable-handle-on-reconnect/]]></link>
			<title>CVE-2026-31717 ksmbd: validate owner of durable handle on reconnect</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41673-xmldom-denial-of-service-via-uncontrolled-recursion-in-xml-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41673-xmldom-denial-of-service-via-uncontrolled-recursion-in-xml-serialization/]]></link>
			<title>CVE-2026-41673 xmldom: Denial of service via uncontrolled recursion in XML serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41675-xmldom-xml-node-injection-through-unvalidated-processing-instruction-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41675-xmldom-xml-node-injection-through-unvalidated-processing-instruction-serialization/]]></link>
			<title>CVE-2026-41675 xmldom: XML node injection through unvalidated processing instruction serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41674-xmldom-xml-injection-through-unvalidated-documenttype-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41674-xmldom-xml-injection-through-unvalidated-documenttype-serialization/]]></link>
			<title>CVE-2026-41674 xmldom: XML injection through unvalidated DocumentType serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41602-apache-thrift-go-tframedtransport-uint32-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41602-apache-thrift-go-tframedtransport-uint32-overflow/]]></link>
			<title>CVE-2026-41602 Apache Thrift: Go TFramedTransport uint32 overflow</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41672-xmldom-xml-node-injection-through-unvalidated-comment-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41672-xmldom-xml-node-injection-through-unvalidated-comment-serialization/]]></link>
			<title>CVE-2026-41672 xmldom: XML node injection through unvalidated comment serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43869-apache-thrift-tssltransportfactory-java-hostname-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43869-apache-thrift-tssltransportfactory-java-hostname-verification/]]></link>
			<title>CVE-2026-43869 Apache Thrift: TSSLTransportFactory.java hostname verification</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42833-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42833-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></link>
			<title>CVE-2026-42833 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41605-apache-thrift-swift-compact-protocol-integer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41605-apache-thrift-swift-compact-protocol-integer-overflow/]]></link>
			<title>CVE-2026-41605 Apache Thrift: Swift Compact Protocol integer overflow</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41603-apache-thrift-java-tssltransportfactory-hostname-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41603-apache-thrift-java-tssltransportfactory-hostname-verification/]]></link>
			<title>CVE-2026-41603 Apache Thrift: Java TSSLTransportFactory hostname verification</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-48431-apache-thrift-specially-crafted-input-can-crash-a-c_glib-thrift-server-with-invalid-pointer-error/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-48431-apache-thrift-specially-crafted-input-can-crash-a-c_glib-thrift-server-with-invalid-pointer-error/]]></link>
			<title>CVE-2025-48431 Apache Thrift: Specially crafted input can crash a c_glib Thrift server with invalid pointer error.</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42151-prometheus-azure-ad-remote-write-oauth-client-secret-exposed-via-config-api/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42151-prometheus-azure-ad-remote-write-oauth-client-secret-exposed-via-config-api/]]></link>
			<title>CVE-2026-42151 Prometheus Azure AD remote write OAuth client secret exposed via config API</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43870-apache-thrift-node-js-web_server-js-multi-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43870-apache-thrift-node-js-web_server-js-multi-vulnerability/]]></link>
			<title>CVE-2026-43870 Apache Thrift: Node.js web_server.js multi-vulnerability</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43868-apache-thrift-rust-implementation-vulnerable-to-cve-2020-13949-pattern/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43868-apache-thrift-rust-implementation-vulnerable-to-cve-2020-13949-pattern/]]></link>
			<title>CVE-2026-43868 Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41082-in-ocaml-opam-before-2-5-1-a-install-field-containing-a-destination-filepath-can-use-to-reach-a-parent-directory/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41082-in-ocaml-opam-before-2-5-1-a-install-field-containing-a-destination-filepath-can-use-to-reach-a-parent-directory/]]></link>
			<title>CVE-2026-41082 In OCaml opam before 2.5.1, a .install field containing a destination filepath can use ../ to reach a parent directory.</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-8328-ftp-pasv-ssrf-ftpcp-does-not-use-actual-peer-address-trusts-server-supplied-pasv-host-address/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-8328-ftp-pasv-ssrf-ftpcp-does-not-use-actual-peer-address-trusts-server-supplied-pasv-host-address/]]></link>
			<title>CVE-2026-8328 FTP PASV SSRF, ftpcp() does not use actual peer address, trusts server-supplied PASV host address</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7246-pallets-click-contains-a-command-injection-via-unsanitized-filename-click-edit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7246-pallets-click-contains-a-command-injection-via-unsanitized-filename-click-edit/]]></link>
			<title>CVE-2026-7246 Pallets Click contains a command injection via Unsanitized Filename &quot;click.edit()&quot;</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43443-asoc-amd-acp-mach-common-add-missing-error-check-for-clock-acquisition/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43443-asoc-amd-acp-mach-common-add-missing-error-check-for-clock-acquisition/]]></link>
			<title>CVE-2026-43443 ASoC: amd: acp-mach-common: Add missing error check for clock acquisition</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44662-rust-openssl-heap-buffer-overflow-when-encrypting-with-aes-key-wrap-with-padding/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44662-rust-openssl-heap-buffer-overflow-when-encrypting-with-aes-key-wrap-with-padding/]]></link>
			<title>CVE-2026-44662 rust-openssl: Heap buffer overflow when encrypting with AES key-wrap-with-padding</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/choosing-the-right-vpn-for-your-business/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/choosing-the-right-vpn-for-your-business/]]></link>
			<title>Choosing the right VPN for your business</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/simple-fixes-for-better-home-wi-fi/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/simple-fixes-for-better-home-wi-fi/]]></link>
			<title>Simple fixes for better home Wi-Fi</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31575-mm-userfaultfd-fix-hugetlb-fault-mutex-hash-calculation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31575-mm-userfaultfd-fix-hugetlb-fault-mutex-hash-calculation/]]></link>
			<title>CVE-2026-31575 mm/userfaultfd: fix hugetlb fault mutex hash calculation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39779-btrfs-subpage-keep-towrite-tag-until-folio-is-cleaned/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39779-btrfs-subpage-keep-towrite-tag-until-folio-is-cleaned/]]></link>
			<title>CVE-2025-39779 btrfs: subpage: keep TOWRITE tag until folio is cleaned</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43311-soc-tegra-pmc-fix-unsafe-generic_handle_irq-call/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43311-soc-tegra-pmc-fix-unsafe-generic_handle_irq-call/]]></link>
			<title>CVE-2026-43311 soc/tegra: pmc: Fix unsafe generic_handle_irq() call</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21634-cgroup-cpuset-remove-kernfs-active-break/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21634-cgroup-cpuset-remove-kernfs-active-break/]]></link>
			<title>CVE-2025-21634 cgroup/cpuset: remove kernfs active break</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31568-s390-mm-add-missing-secure-storage-access-fixups-for-donated-memory/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31568-s390-mm-add-missing-secure-storage-access-fixups-for-donated-memory/]]></link>
			<title>CVE-2026-31568 s390/mm: Add missing secure storage access fixups for donated memory</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39707-drm-amdgpu-check-if-hubbub-is-null-in-debugfs-amdgpu_dm_capabilities/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39707-drm-amdgpu-check-if-hubbub-is-null-in-debugfs-amdgpu_dm_capabilities/]]></link>
			<title>CVE-2025-39707 drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43398-drm-amdgpu-add-upper-bound-check-on-user-inputs-in-wait-ioctl/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43398-drm-amdgpu-add-upper-bound-check-on-user-inputs-in-wait-ioctl/]]></link>
			<title>CVE-2026-43398 drm/amdgpu: add upper bound check on user inputs in wait ioctl</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21635-rds-sysctl-rds_tcp_rcvsndbuf-avoid-using-current-nsproxy/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21635-rds-sysctl-rds_tcp_rcvsndbuf-avoid-using-current-nsproxy/]]></link>
			<title>CVE-2025-21635 rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current-&gt;nsproxy</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39747-drm-msm-add-error-handling-for-krealloc-in-metadata-setup/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39747-drm-msm-add-error-handling-for-krealloc-in-metadata-setup/]]></link>
			<title>CVE-2025-39747 drm/msm: Add error handling for krealloc in metadata setup</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52586-drm-msm-dpu-add-mutex-lock-in-control-vblank-irq/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52586-drm-msm-dpu-add-mutex-lock-in-control-vblank-irq/]]></link>
			<title>CVE-2023-52586 drm/msm/dpu: Add mutex lock in control vblank irq</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39746-wifi-ath10k-shutdown-driver-when-hardware-is-unreliable/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39746-wifi-ath10k-shutdown-driver-when-hardware-is-unreliable/]]></link>
			<title>CVE-2025-39746 wifi: ath10k: shutdown driver when hardware is unreliable</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31579-wireguard-device-use-exit_rtnl-callback-instead-of-manual-rtnl_lock-in-pre_exit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31579-wireguard-device-use-exit_rtnl-callback-instead-of-manual-rtnl_lock-in-pre_exit/]]></link>
			<title>CVE-2026-31579 wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
				</channel>
</rss>
