<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on March 29, 2026 at 6:29 pm by All in One SEO v4.9.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberandcoffee.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyber &amp; Coffee</title>
		<link><![CDATA[https://cyberandcoffee.com]]></link>
		<description><![CDATA[Cyber &amp; Coffee]]></description>
		<lastBuildDate><![CDATA[Wed, 28 Jan 2026 20:53:50 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberandcoffee.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberandcoffee.com/festo-didactic-se-mes-pc/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/festo-didactic-se-mes-pc/]]></link>
			<title>Festo Didactic SE MES PC</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 20:53:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/blog/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 27 Mar 2024 20:00:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-six-known-exploited-vulnerabilities-to-catalog-4/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-six-known-exploited-vulnerabilities-to-catalog-4/]]></link>
			<title>CISA Adds Six Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/zoll-epcr-ios-mobile-application/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/zoll-epcr-ios-mobile-application/]]></link>
			<title>ZOLL ePCR IOS Mobile Application</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/barriers-to-secure-ot-communication-why-johnny-cant-authenticate/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/barriers-to-secure-ot-communication-why-johnny-cant-authenticate/]]></link>
			<title>​​Barriers to Secure OT Communication: Why Johnny Can’t Authenticate​</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/]]></link>
			<pubDate><![CDATA[Sat, 16 Aug 2025 04:29:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps/]]></link>
			<title>Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-14/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-14/]]></link>
			<title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 22:53:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-polarion-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-polarion-2/]]></link>
			<title>Siemens Polarion</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/airleader-master/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/airleader-master/]]></link>
			<title>Airleader Master</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-desigo-cc-product-family-and-sentron-powermanager/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-desigo-cc-product-family-and-sentron-powermanager/]]></link>
			<title>Siemens Desigo CC Product Family and SENTRON Powermanager</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/hitachi-energy-supros/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/hitachi-energy-supros/]]></link>
			<title>Hitachi Energy SuprOS</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-nx-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-nx-2/]]></link>
			<title>Siemens NX</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-comos-5/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-comos-5/]]></link>
			<title>Siemens COMOS</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-announces-new-town-halls-to-engage-with-stakeholders-on-cyber-incident-reporting-for-critical-infrastructure/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-announces-new-town-halls-to-engage-with-stakeholders-on-cyber-incident-reporting-for-critical-infrastructure/]]></link>
			<title>CISA Announces New Town Halls to Engage with Stakeholders on Cyber Incident Reporting for Critical Infrastructure</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 22:53:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/zlan-information-technology-co-zlan5143d/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/zlan-information-technology-co-zlan5143d/]]></link>
			<title>ZLAN Information Technology Co. ZLAN5143D</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-solid-edge-7/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-solid-edge-7/]]></link>
			<title>Siemens Solid Edge</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-sinec-nms-6/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-sinec-nms-6/]]></link>
			<title>Siemens SINEC NMS</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/aveva-pi-to-connect-agent/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/aveva-pi-to-connect-agent/]]></link>
			<title>AVEVA PI to CONNECT Agent</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-siveillance-video-management-servers/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-siveillance-video-management-servers/]]></link>
			<title>Siemens Siveillance Video Management Servers</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/aveva-pi-data-archive-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/aveva-pi-data-archive-2/]]></link>
			<title>AVEVA PI Data Archive</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/fortinet-releases-guidance-to-address-ongoing-exploitation-of-authentication-bypass-vulnerability-cve-2026-24858/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/fortinet-releases-guidance-to-address-ongoing-exploitation-of-authentication-bypass-vulnerability-cve-2026-24858/]]></link>
			<title>Fortinet Releases Guidance to Address Ongoing Exploitation of Authentication Bypass Vulnerability CVE-2026-24858</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 20:53:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-sinec-os-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-sinec-os-2/]]></link>
			<title>Siemens SINEC OS</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/yokogawa-fast-tools/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/yokogawa-fast-tools/]]></link>
			<title>Yokogawa FAST/TOOLS</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 10:31:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-five-known-exploited-vulnerabilities-to-catalog-11/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-five-known-exploited-vulnerabilities-to-catalog-11/]]></link>
			<title>CISA Adds Five Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Tue, 27 Jan 2026 06:06:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/reducing-the-attack-surface-for-end-of-support-edge-devices/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/reducing-the-attack-surface-for-end-of-support-edge-devices/]]></link>
			<title>Reducing the Attack Surface for End-of-Support Edge Devices</title>
			<pubDate><![CDATA[Tue, 10 Feb 2026 08:17:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/mitsubishi-electric-freqship-mini-for-windows/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/mitsubishi-electric-freqship-mini-for-windows/]]></link>
			<title>Mitsubishi Electric FREQSHIP-mini for Windows</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 00:42:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-86/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-86/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Sun, 15 Feb 2026 08:10:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-85/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-85/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 00:42:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/hitachi-energy-xmc20-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/hitachi-energy-xmc20-2/]]></link>
			<title>Hitachi Energy XMC20</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 17:52:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/schneider-electric-zigbee-products/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/schneider-electric-zigbee-products/]]></link>
			<title>Schneider Electric Zigbee Products</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 20:53:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/johnson-controls-products/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/johnson-controls-products/]]></link>
			<title>Johnson Controls Products</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 20:53:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-84/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-84/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 20:53:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/ilevia-eve-x1-server/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/ilevia-eve-x1-server/]]></link>
			<title>Ilevia EVE X1 Server</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 17:52:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/tp-link-systems-inc-vigi-series-ip-camera/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/tp-link-systems-inc-vigi-series-ip-camera/]]></link>
			<title>TP-Link Systems Inc. VIGI Series IP Camera</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 17:52:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/iba-systems-ibapda/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/iba-systems-ibapda/]]></link>
			<title>iba Systems ibaPDA</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 20:53:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/hitachi-energy-fox61x/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/hitachi-energy-fox61x/]]></link>
			<title>Hitachi Energy FOX61x</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 17:52:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/riss-srl-moma-seismic-station/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/riss-srl-moma-seismic-station/]]></link>
			<title>RISS SRL MOMA Seismic Station</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 00:42:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/synectix-lan-232-trio/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/synectix-lan-232-trio/]]></link>
			<title>Synectix LAN 232 TRIO</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 00:42:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/avation-light-engine-pro/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/avation-light-engine-pro/]]></link>
			<title>Avation Light Engine Pro</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 00:42:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-13/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-13/]]></link>
			<title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 00:42:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/rockwell-automation-controllogix-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/rockwell-automation-controllogix-2/]]></link>
			<title>Rockwell Automation ControlLogix</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 00:42:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/rockwell-automation-armorstart-lt/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/rockwell-automation-armorstart-lt/]]></link>
			<title>Rockwell Automation ArmorStart LT</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 00:42:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/kiloview-encoder-series/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/kiloview-encoder-series/]]></link>
			<title>KiloView Encoder Series</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 00:42:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/mitsubishi-electric-melsec-iq-r-series/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/mitsubishi-electric-melsec-iq-r-series/]]></link>
			<title>Mitsubishi Electric MELSEC iQ-R Series</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 17:52:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-83/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-83/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Sat, 24 Jan 2026 18:40:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/o6-automation-gmbh-open62541/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/o6-automation-gmbh-open62541/]]></link>
			<title>o6 Automation GmbH Open62541</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 17:52:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/product-categories-for-technologies-that-use-post-quantum-cryptography-standards/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/product-categories-for-technologies-that-use-post-quantum-cryptography-standards/]]></link>
			<title>Product Categories for Technologies That Use Post-Quantum Cryptography Standards</title>
			<pubDate><![CDATA[Sat, 24 Jan 2026 18:40:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/johnson-controls-inc-istar-configuration-utility-icu-tool/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/johnson-controls-inc-istar-configuration-utility-icu-tool/]]></link>
			<title>Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool</title>
			<pubDate><![CDATA[Fri, 23 Jan 2026 05:01:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-42/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-42/]]></link>
			<title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 17:52:39 +0000]]></pubDate>
		</item>
				</channel>
</rss>
