<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 30, 2026 at 11:17 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31582-hwmon-powerz-fix-use-after-free-on-usb-disconnect/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31582-hwmon-powerz-fix-use-after-free-on-usb-disconnect/]]></link>
			<title>CVE-2026-31582 hwmon: (powerz) Fix use-after-free on USB disconnect</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31588-kvm-x86-use-scratch-field-in-mmio-fragment-to-hold-small-write-values/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31588-kvm-x86-use-scratch-field-in-mmio-fragment-to-hold-small-write-values/]]></link>
			<title>CVE-2026-31588 KVM: x86: Use scratch field in MMIO fragment to hold small write values</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31649-net-stmmac-fix-integer-underflow-in-chain-mode/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31649-net-stmmac-fix-integer-underflow-in-chain-mode/]]></link>
			<title>CVE-2026-31649 net: stmmac: fix integer underflow in chain mode</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-24051-opentelemetry-go-affected-by-arbitrary-code-execution-via-path-hijacking/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-24051-opentelemetry-go-affected-by-arbitrary-code-execution-via-path-hijacking/]]></link>
			<title>CVE-2026-24051 OpenTelemetry-Go Affected by Arbitrary Code Execution via PATH Hijacking</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6019-basecookie-js_output-does-not-neutralize-embedded-characters/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6019-basecookie-js_output-does-not-neutralize-embedded-characters/]]></link>
			<title>CVE-2026-6019 BaseCookie.js_output() does not neutralize embedded characters</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41898-rust-openssl-unchecked-callback-returned-length-in-psk-and-cookie-generate-trampolines-can-cause-openssl-to-leak-adjacent-memory-to-the-network-peer/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41898-rust-openssl-unchecked-callback-returned-length-in-psk-and-cookie-generate-trampolines-can-cause-openssl-to-leak-adjacent-memory-to-the-network-peer/]]></link>
			<title>CVE-2026-41898 rust-openssl: Unchecked callback-returned length in PSK and cookie generate trampolines can cause OpenSSL to leak adjacent memory to the network peer</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6732-libxml2-libxml2-denial-of-service-via-crafted-xsd-validated-document/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6732-libxml2-libxml2-denial-of-service-via-crafted-xsd-validated-document/]]></link>
			<title>CVE-2026-6732 Libxml2: libxml2: denial of service via crafted xsd-validated document</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2708-libsoup-libsoup-http-request-smuggling-via-duplicate-content-length-headers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2708-libsoup-libsoup-http-request-smuggling-via-duplicate-content-length-headers/]]></link>
			<title>CVE-2026-2708 Libsoup: libsoup: http request smuggling via duplicate content-length headers</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1547-ecdsa-remote-timing-attack/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1547-ecdsa-remote-timing-attack/]]></link>
			<title>CVE-2019-1547 ECDSA remote timing attack</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5778-integer-underflow-leads-to-out-of-bounds-access-in-sniffer-chacha-decrypt-path/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5778-integer-underflow-leads-to-out-of-bounds-access-in-sniffer-chacha-decrypt-path/]]></link>
			<title>CVE-2026-5778 Integer underflow leads to out-of-bounds access in sniffer ChaCha decrypt path.</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5188-integer-underflow-in-x-509-san-parsing-in-wolfssl/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5188-integer-underflow-in-x-509-san-parsing-in-wolfssl/]]></link>
			<title>CVE-2026-5188 Integer underflow in X.509 SAN parsing in wolfSSL</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1543-chacha20-poly1305-with-long-nonces/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1543-chacha20-poly1305-with-long-nonces/]]></link>
			<title>CVE-2019-1543 ChaCha20-Poly1305 with long nonces</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5295-stack-buffer-overflow-in-wolfssl-pkcs7-wc_pkcs7_decryptori-via-oversized-oid/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5295-stack-buffer-overflow-in-wolfssl-pkcs7-wc_pkcs7_decryptori-via-oversized-oid/]]></link>
			<title>CVE-2026-5295 Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5503-out-of-bounds-write-in-tlsx_echchangesni-via-attacker-controlled-publicname/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5503-out-of-bounds-write-in-tlsx_echchangesni-via-attacker-controlled-publicname/]]></link>
			<title>CVE-2026-5503 out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1563-padding-oracle-in-pkcs7_datadecode-and-cms_decrypt_set1_pkey/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1563-padding-oracle-in-pkcs7_datadecode-and-cms_decrypt_set1_pkey/]]></link>
			<title>CVE-2019-1563 Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5507-session-cache-restore-arbitrary-free-via-deserialized-pointer/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5507-session-cache-restore-arbitrary-free-via-deserialized-pointer/]]></link>
			<title>CVE-2026-5507 Session Cache Restore — Arbitrary Free via Deserialized Pointer</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1551-rsaz_512_sqr-overflow-bug-on-x86_64/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1551-rsaz_512_sqr-overflow-bug-on-x86_64/]]></link>
			<title>CVE-2019-1551 rsaz_512_sqr overflow bug on x86_64</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5504-pkcs7-cbc-padding-oracle-plaintext-recovery/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5504-pkcs7-cbc-padding-oracle-plaintext-recovery/]]></link>
			<title>CVE-2026-5504 PKCS7 CBC Padding Oracle — Plaintext Recovery</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5393-oob-read-in-dotls13certificateverify-with-wolfssl_dual_alg_certs/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5393-oob-read-in-dotls13certificateverify-with-wolfssl_dual_alg_certs/]]></link>
			<title>CVE-2026-5393 OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31420-bridge-mrp-reject-zero-test-interval-to-avoid-oom-panic/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31420-bridge-mrp-reject-zero-test-interval-to-avoid-oom-panic/]]></link>
			<title>CVE-2026-31420 bridge: mrp: reject zero test interval to avoid OOM panic</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34477-apache-log4j-core-verifyhostname-attribute-silently-ignored-in-tls-configuration-allowing-hostname-verification-bypass/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34477-apache-log4j-core-verifyhostname-attribute-silently-ignored-in-tls-configuration-allowing-hostname-verification-bypass/]]></link>
			<title>CVE-2026-34477 Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31584-media-mediatek-vcodec-fix-use-after-free-in-encoder-release-path/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31584-media-mediatek-vcodec-fix-use-after-free-in-encoder-release-path/]]></link>
			<title>CVE-2026-31584 media: mediatek: vcodec: fix use-after-free in encoder release path</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31669-mptcp-fix-slab-use-after-free-in-__inet_lookup_established/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31669-mptcp-fix-slab-use-after-free-in-__inet_lookup_established/]]></link>
			<title>CVE-2026-31669 mptcp: fix slab-use-after-free in __inet_lookup_established</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31628-x86-cpu-fix-fpdss-on-zen1/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31628-x86-cpu-fix-fpdss-on-zen1/]]></link>
			<title>CVE-2026-31628 x86/CPU: Fix FPDSS on Zen1</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31630-rxrpc-proc-size-address-buffers-for-pispc-output/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31630-rxrpc-proc-size-address-buffers-for-pispc-output/]]></link>
			<title>CVE-2026-31630 rxrpc: proc: size address buffers for %pISpc output</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31629-nfc-llcp-add-missing-return-after-llcp_closed-checks/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31629-nfc-llcp-add-missing-return-after-llcp_closed-checks/]]></link>
			<title>CVE-2026-31629 nfc: llcp: add missing return after LLCP_CLOSED checks</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31657-batman-adv-hold-claim-backbone-gateways-by-reference/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31657-batman-adv-hold-claim-backbone-gateways-by-reference/]]></link>
			<title>CVE-2026-31657 batman-adv: hold claim backbone gateways by reference</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31616-usb-gadget-f_phonet-fix-skb-frags-overflow-in-pn_rx_complete/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31616-usb-gadget-f_phonet-fix-skb-frags-overflow-in-pn_rx_complete/]]></link>
			<title>CVE-2026-31616 usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31576-media-hackrf-fix-to-not-free-memory-after-the-device-is-registered-in-hackrf_probe/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31576-media-hackrf-fix-to-not-free-memory-after-the-device-is-registered-in-hackrf_probe/]]></link>
			<title>CVE-2026-31576 media: hackrf: fix to not free memory after the device is registered in hackrf_probe()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34591-poetry-has-wheel-path-traversal-which-can-lead-to-arbitrary-file-write/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34591-poetry-has-wheel-path-traversal-which-can-lead-to-arbitrary-file-write/]]></link>
			<title>CVE-2026-34591 Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23388-squashfs-check-metadata-block-offset-is-within-range/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23388-squashfs-check-metadata-block-offset-is-within-range/]]></link>
			<title>CVE-2026-23388 Squashfs: check metadata block offset is within range</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31619-alsa-fireworks-bound-device-supplied-status-before-string-array-lookup/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31619-alsa-fireworks-bound-device-supplied-status-before-string-array-lookup/]]></link>
			<title>CVE-2026-31619 ALSA: fireworks: bound device-supplied status before string array lookup</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31592-kvm-sev-protect-all-of-sev_mem_enc_register_region-with-kvm-lock/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31592-kvm-sev-protect-all-of-sev_mem_enc_register_region-with-kvm-lock/]]></link>
			<title>CVE-2026-31592 KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm-&gt;lock</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31597-ocfs2-fix-use-after-free-in-ocfs2_fault-when-vm_fault_retry/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31597-ocfs2-fix-use-after-free-in-ocfs2_fault-when-vm_fault_retry/]]></link>
			<title>CVE-2026-31597 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31578-media-as102-fix-to-not-free-memory-after-the-device-is-registered-in-as102_usb_probe/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31578-media-as102-fix-to-not-free-memory-after-the-device-is-registered-in-as102_usb_probe/]]></link>
			<title>CVE-2026-31578 media: as102: fix to not free memory after the device is registered in as102_usb_probe()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31586-mm-blk-cgroup-fix-use-after-free-in-cgwb_release_workfn/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31586-mm-blk-cgroup-fix-use-after-free-in-cgwb_release_workfn/]]></link>
			<title>CVE-2026-31586 mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/how-a-small-business-can-get-real-returns-from-ai/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/how-a-small-business-can-get-real-returns-from-ai/]]></link>
			<title>How a small business can get real returns from AI</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/a-hidden-android-flaw-that-breaks-the-lock-screen-in-seconds/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/a-hidden-android-flaw-that-breaks-the-lock-screen-in-seconds/]]></link>
			<title>A hidden Android flaw that breaks the lock screen in seconds</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/m5-macbook-air-vs-macbook-neo-which-apple-laptop-is-right-for-you/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/m5-macbook-air-vs-macbook-neo-which-apple-laptop-is-right-for-you/]]></link>
			<title>M5 MacBook Air vs. MacBook Neo: Which Apple laptop is right for you?</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32202-windows-shell-spoofing-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32202-windows-shell-spoofing-vulnerability/]]></link>
			<title>CVE-2026-32202 Windows Shell Spoofing Vulnerability</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0734-timing-attack-against-dsa/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0734-timing-attack-against-dsa/]]></link>
			<title>CVE-2018-0734 Timing attack against DSA</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0735-timing-attack-against-ecdsa-signature-generation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0735-timing-attack-against-ecdsa-signature-generation/]]></link>
			<title>CVE-2018-0735 Timing attack against ECDSA signature generation</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33825-microsoft-defender-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33825-microsoft-defender-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-33825 Microsoft Defender Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23372-nfc-rawsock-cancel-tx_work-before-socket-teardown/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23372-nfc-rawsock-cancel-tx_work-before-socket-teardown/]]></link>
			<title>CVE-2026-23372 nfc: rawsock: cancel tx_work before socket teardown</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23371-sched-deadline-fix-missing-enqueue_replenish-during-pi-de-boosting/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23371-sched-deadline-fix-missing-enqueue_replenish-during-pi-de-boosting/]]></link>
			<title>CVE-2026-23371 sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23370-platform-x86-dell-wmi-sysman-dont-hex-dump-plaintext-password-data/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23370-platform-x86-dell-wmi-sysman-dont-hex-dump-plaintext-password-data/]]></link>
			<title>CVE-2026-23370 platform/x86: dell-wmi-sysman: Don&#039;t hex dump plaintext password data</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23368-net-phy-register-phy-led_triggers-during-probe-to-avoid-ab-ba-deadlock/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23368-net-phy-register-phy-led_triggers-during-probe-to-avoid-ab-ba-deadlock/]]></link>
			<title>CVE-2026-23368 net: phy: register phy led_triggers during probe to avoid AB-BA deadlock</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/website-design-in-2026-what-actually-drives-results-for-small-businesses/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/website-design-in-2026-what-actually-drives-results-for-small-businesses/]]></link>
			<title>Website design in 2026: What actually drives results for small businesses</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 23:46:22 +0000]]></pubDate>
		</item>
				</channel>
</rss>
