<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 3, 2026 at 7:21 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberandcoffee.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyber &amp; Coffee</title>
		<link><![CDATA[https://cyberandcoffee.com]]></link>
		<description><![CDATA[Cyber &amp; Coffee]]></description>
		<lastBuildDate><![CDATA[Wed, 27 Mar 2024 20:00:20 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberandcoffee.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberandcoffee.com/blog/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 27 Mar 2024 20:00:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-43/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-43/]]></link>
			<title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 22:54:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-time-slots/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-time-slots/]]></link>
			<title>Time Slots Booking</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:16:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-time-appointments/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-time-appointments/]]></link>
			<title>Time Appointments Booking</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:16:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-contact/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-contact/]]></link>
			<title>Contact Form</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:16:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-full-day/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/wp-booking-calendar-full-day/]]></link>
			<title>Full Day Booking</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:16:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/spicejet-online-booking-system/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/spicejet-online-booking-system/]]></link>
			<title>SpiceJet Online Booking System</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/yadea-t5-electric-bicycle/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/yadea-t5-electric-bicycle/]]></link>
			<title>Yadea T5 Electric Bicycle</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/adapting-zero-trust-principles-to-operational-technology/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/adapting-zero-trust-principles-to-operational-technology/]]></link>
			<title>Adapting Zero Trust Principles to Operational Technology</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-44/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-44/]]></link>
			<title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-15/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-15/]]></link>
			<title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/intrado-911-emergency-gateway-egw/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/intrado-911-emergency-gateway-egw/]]></link>
			<title>Intrado 911 Emergency Gateway (EGW)</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/milesight-cameras/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/milesight-cameras/]]></link>
			<title>Milesight Cameras</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/defending-against-china-nexus-covert-networks-of-compromised-devices/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/defending-against-china-nexus-covert-networks-of-compromised-devices/]]></link>
			<title>Defending Against China-Nexus Covert Networks of Compromised Devices</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-and-u-s-government-partners-unveil-guide-to-accelerate-zero-trust-adoption-in-operational-technology/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-and-u-s-government-partners-unveil-guide-to-accelerate-zero-trust-adoption-in-operational-technology/]]></link>
			<title>CISA and U.S. Government Partners Unveil Guide to Accelerate Zero Trust Adoption in Operational Technology</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-94/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-94/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 19:30:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/nsa-grassmarlin/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/nsa-grassmarlin/]]></link>
			<title>NSA GRASSMARLIN</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-seven-known-exploited-vulnerabilities-to-catalog-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-seven-known-exploited-vulnerabilities-to-catalog-2/]]></link>
			<title>CISA Adds Seven Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:19:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/contemporary-controls-basc-20t/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/contemporary-controls-basc-20t/]]></link>
			<title>Contemporary Controls BASC 20T</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:45:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/gpl-odorizers-gpl750/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/gpl-odorizers-gpl750/]]></link>
			<title>GPL Odorizers GPL750</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:45:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/mitsubishi-electric-genesis64-and-iconics-suite-products/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/mitsubishi-electric-genesis64-and-iconics-suite-products/]]></link>
			<title>Mitsubishi Electric GENESIS64 and ICONICS Suite products</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:31:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/iranian-affiliated-cyber-actors-exploit-programmable-logic-controllers-across-us-critical-infrastructure/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/iranian-affiliated-cyber-actors-exploit-programmable-logic-controllers-across-us-critical-infrastructure/]]></link>
			<title>Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:31:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/anritsu-remote-spectrum-monitor/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/anritsu-remote-spectrum-monitor/]]></link>
			<title>Anritsu Remote Spectrum Monitor</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 06:34:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/px4-autopilot/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/px4-autopilot/]]></link>
			<title>PX4 Autopilot</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 06:34:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/]]></link>
			<pubDate><![CDATA[Sat, 16 Aug 2025 04:29:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-93/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-93/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:49:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-92/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-92/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:08:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/hitachi-energy-ellipse/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/hitachi-energy-ellipse/]]></link>
			<title>Hitachi Energy Ellipse</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:08:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-91/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-91/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 05:17:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/wpbc-bfb-preview/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/wpbc-bfb-preview/]]></link>
			<title>Booking Form Preview</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:29:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/airleader-master/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/airleader-master/]]></link>
			<title>Airleader Master</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-88/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-88/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-86/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-86/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Sun, 15 Feb 2026 08:10:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/opencode-systems-oc-messaging-and-ussd-gateway/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/opencode-systems-oc-messaging-and-ussd-gateway/]]></link>
			<title>OpenCode Systems OC Messaging and USSD Gateway</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-89/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-89/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/wago-gmbh-co-kg-industrial-managed-switches/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/wago-gmbh-co-kg-industrial-managed-switches/]]></link>
			<title>WAGO GmbH &amp; Co. KG Industrial Managed Switches</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/ptc-windchill-product-lifecycle-management/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/ptc-windchill-product-lifecycle-management/]]></link>
			<title>PTC Windchill Product Lifecycle Management</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-90/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-90/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/pharos-controls-mosaic-show-controller/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/pharos-controls-mosaic-show-controller/]]></link>
			<title>Pharos Controls Mosaic Show Controller</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/schneider-electric-plant-it-brewmaxx/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/schneider-electric-plant-it-brewmaxx/]]></link>
			<title>Schneider Electric Plant iT/Brewmaxx</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/schneider-electric-ecostruxure-foxboro-dcs-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/schneider-electric-ecostruxure-foxboro-dcs-2/]]></link>
			<title>Schneider Electric EcoStruxure Foxboro DCS</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-87/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-one-known-exploited-vulnerability-to-catalog-87/]]></link>
			<title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:28:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-14/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-14/]]></link>
			<title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 22:53:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/cisa-announces-new-town-halls-to-engage-with-stakeholders-on-cyber-incident-reporting-for-critical-infrastructure/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/cisa-announces-new-town-halls-to-engage-with-stakeholders-on-cyber-incident-reporting-for-critical-infrastructure/]]></link>
			<title>CISA Announces New Town Halls to Engage with Stakeholders on Cyber Incident Reporting for Critical Infrastructure</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 22:53:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-polarion-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-polarion-2/]]></link>
			<title>Siemens Polarion</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-desigo-cc-product-family-and-sentron-powermanager/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-desigo-cc-product-family-and-sentron-powermanager/]]></link>
			<title>Siemens Desigo CC Product Family and SENTRON Powermanager</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-sicam-8-products/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-sicam-8-products/]]></link>
			<title>Siemens SICAM 8 Products</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:08:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/hitachi-energy-supros/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/hitachi-energy-supros/]]></link>
			<title>Hitachi Energy SuprOS</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/siemens-nx-2/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/siemens-nx-2/]]></link>
			<title>Siemens NX</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 21:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberandcoffee.com/yokogawa-centum-vp/]]></guid>
			<link><![CDATA[https://cyberandcoffee.com/yokogawa-centum-vp/]]></link>
			<title>Yokogawa CENTUM VP</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:08:23 +0000]]></pubDate>
		</item>
				</channel>
</rss>
