<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/axonflow-corrige-defectos-aislamiento-multitenant-control-acceso-plataforma</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-9h64-2846-7x7f/apisdom-autopsia-alertas-a2-2026-05-o7.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T11:16:44.706Z</news:publication_date>
      <news:title>Axonflow corrige defectos de aislamiento multi-tenant y control de acceso en plataforma IA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/diffusers-permite-bypass-trustremotecode-via-custompipeline-ejecutando-codigo</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-98h9-4798-4q5v/apisdom-autopsia-alertas-a1-2026-05-o7.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T11:11:27.088Z</news:publication_date>
      <news:title>Diffusers permite bypass de trust_remote_code via custom_pipeline ejecutando código remoto arbitrario</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/noticia/estafadores-usan-ia-crear-imagenes-falsas</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/incidents/1478/apisdom-autopsia-noticias-n2-2026-05-07.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T10:52:46.520Z</news:publication_date>
      <news:title>Estafadores usan IA para crear imágenes falsas de perro perdido y extorsionar a familia de Florida</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/noticia/fbi-usa-ia-recrear-videoclip-sabotage</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/incidents/1480/apisdom-autopsia-noticias-n5-2026-05-07.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T10:45:28.075Z</news:publication_date>
      <news:title>El FBI usa IA para recrear el videoclip &apos;Sabotage&apos; de Beastie Boys en un vídeo promocional</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/pptagent-ejecucion-arbitraria-codigo-via-eval-python-acceso</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-89g2-xw5c-v95p/apisdom-autopsia-alertas-a1-2026-05-o6.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:46:58.923Z</news:publication_date>
      <news:title>PPTAgent: Ejecución arbitraria de código via eval() de Python con acceso a builtins en LLM</news:title>
    </news:news>
  </url>
</urlset>