<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/linkedin-secretely-scans-for-6-000-plus-chrome-extensions-collects-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:40:22.000Z</news:publication_date>
      <news:title>LinkedIn secretely scans for 6,000+ Chrome extensions, collects data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fcc-proposes-5-million-fine-robocall</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:12:00.000Z</news:publication_date>
      <news:title>FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/trueconf-cyberattack-cisa-hackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:45:00.000Z</news:publication_date>
      <news:title>CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbn3w3/what_if_hsms_were_as_easy_to_use_as_they_are/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:22:56.000Z</news:publication_date>
      <news:title>What If HSMs Were as Easy to Use as They Are Powerful? A native macOS app for YubiHSM 2 management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/the-developer-credential-economy-exposure-data-is-the-new-front-line-in-the-supply-chain-war</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:50:57.000Z</news:publication_date>
      <news:title>The developer credential economy: Why exposure data is the new front line in the supply chain war</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbm7me/the_axios_supply_chain_attack_used_individually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:49:58.000Z</news:publication_date>
      <news:title>The Axios supply chain attack used individually targeted social engineering</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sblspg/i_accidently_let_my_sans_cert_expire_so_i_built_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:34:33.000Z</news:publication_date>
      <news:title>I accidently let my SANS cert expire so I built a tool to track team cert expiry</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sblpgx/hiring_from_a_director_of_cybers_perspective/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:13.000Z</news:publication_date>
      <news:title>Hiring from a director of cyber's perspective.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/european-commission-cyberattack-teampcp</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:15:00.000Z</news:publication_date>
      <news:title>EU cyber agency attributes major data breach to TeamPCP hacking group</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbktww/someone_is_actively_publishing_malicious_packages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:59:26.000Z</news:publication_date>
      <news:title>Someone is actively publishing malicious packages targeting the Strapi plugin ecosystem right now</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbkn6q/is_pki_a_good_longterm_career_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:52:34.000Z</news:publication_date>
      <news:title>Is PKI a good long-term career in cybersecurity? (Scope, salaries, future with AI)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hims-and-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:41:11.000Z</news:publication_date>
      <news:title>Hims &amp; Hers warns of data breach after Zendesk support ticket breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:34:00.000Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbk0ep/seeking_arxiv_endorsement_for_cscr/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:29:24.000Z</news:publication_date>
      <news:title>Seeking Arxiv Endorsement for cs.CR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbjppf/has_anybody_used_zip_security_and_now_what_their/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:18:41.000Z</news:publication_date>
      <news:title>Has anybody used Zip Security and now what their pricing is?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/apple-patches-darksword-ios-18</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:08:57.000Z</news:publication_date>
      <news:title>Apple Breaks Precedent, Patches DarkSword for iOS 18</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbj51g/relearning_pythonbashpowershell/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:58:07.000Z</news:publication_date>
      <news:title>Relearning Python/Bash/Powershell</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbj2o6/how_false_are_false_positives_moving_from_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:55:47.000Z</news:publication_date>
      <news:title>How "false" are false positives? Moving from a Hunter to an Architect mindset.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbimd3/bots_v2_questions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:39:10.000Z</news:publication_date>
      <news:title>BOTS v2 QUESTIONS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:36:44.000Z</news:publication_date>
      <news:title>Die Linke German political party confirms data stolen by Qilin ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:33:14.000Z</news:publication_date>
      <news:title>Trump budget proposal would cut hundreds of millions more from CISA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/wyden-warns-ssa-chief-trump-voter-database-blatant-voter-suppression/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:30:24.000Z</news:publication_date>
      <news:title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbhdtm/i_just_experienced_my_first_fullblown_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:53:11.000Z</news:publication_date>
      <news:title>I just experienced my first full-blown malware incident as an IT person</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbgxd2/infostealers_ulp_urlloginpassword_data_is_burning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:36:12.000Z</news:publication_date>
      <news:title>Infostealers ULP (url:login:password) Data Is Burning Out SOC Teams and Killing Automation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:32:00.000Z</news:publication_date>
      <news:title>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/teampcp-attacks-hacker-infighting</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:11:16.000Z</news:publication_date>
      <news:title>Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbg683/mssp_recommendations_for_horizon3ai_in_smallscale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:08:09.000Z</news:publication_date>
      <news:title>MSSP recommendations for Horizon3.ai in small-scale, dynamic environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbfq4u/claude_code_found_a_linux_vulnerability_hidden/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:51:20.000Z</news:publication_date>
      <news:title>Claude Code Found a Linux Vulnerability Hidden for 23 Years</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbfil2/npmsentinel_21_malicious_npm_packages_in_24h/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:43:18.000Z</news:publication_date>
      <news:title>npm-sentinel: 21 malicious npm packages in 24h including LLM API MITM, encrypted skill backdoors, and Redis weaponization via postinstall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfg2m/21_malicious_npm_packages_found_in_24_hours_4/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:40:30.000Z</news:publication_date>
      <news:title>21 malicious npm packages found in 24 hours: 4 novel attack vectors targeting AI coding assistants including LLM API MITM and encrypted skill backdoors</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/blocking-children-from-social-media-is-a-badly-executed-good-idea</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:37:52.000Z</news:publication_date>
      <news:title>Blocking children from social media is a badly executed good idea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfcxj/new_rowhammer_attacks_give_complete_control_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:37:05.000Z</news:publication_date>
      <news:title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfcrd/i_feel_behind/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:36:53.000Z</news:publication_date>
      <news:title>I feel behind</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:05:15.000Z</news:publication_date>
      <news:title>Evolution of Ransomware: Multi-Extortion Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbehds/is_this_a_good_roadmap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:02:55.000Z</news:publication_date>
      <news:title>Is this a good roadmap?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/massachusetts-emergency-alert-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:00:00.000Z</news:publication_date>
      <news:title>Massachusetts emergency communications system impacted by cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbe9tn/using_undocumented_aws_codebuild_endpoints_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:54:42.000Z</news:publication_date>
      <news:title>Using undocumented AWS CodeBuild endpoints to extract privileged tokens from AWS CodeConnections allowing lateral movement and privilege escalation through an organisation's codebase</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbdtyi/if_youre_running_openclaw_you_probably_got_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:36:49.000Z</news:publication_date>
      <news:title>If you're running OpenClaw, you probably got hacked in the last week</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbds9i/if_youre_running_openclaw_you_probably_got_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:34:55.000Z</news:publication_date>
      <news:title>If you're running OpenClaw, you probably got hacked in the last week</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/remote-workforce/skull-vibrations-could-be-xr-headset-authentication</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:30:00.000Z</news:publication_date>
      <news:title>Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ukraine-warns-russian-hackers-revisiting-old-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:20:00.000Z</news:publication_date>
      <news:title>Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32864</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:18:01.000Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000&amp;#x2b; SaaS Environments, (Fri, Apr 3rd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:00:00.000Z</news:publication_date>
      <news:title>Source Code Leaks Highlight Lack of Supply Chain Oversight</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-14-6/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:00:00.000Z</news:publication_date>
      <news:title>The Good, the Bad and the Ugly in Cybersecurity – Week 14</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:59:22.000Z</news:publication_date>
      <news:title>Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:57:28.000Z</news:publication_date>
      <news:title>Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbcny3/man_admits_to_locking_thousands_of_windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:48:03.000Z</news:publication_date>
      <news:title>Man admits to locking thousands of Windows devices in extortion plot</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trueconf-zero-day-exploited-in-asian-government-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:47:16.000Z</news:publication_date>
      <news:title>TrueConf Zero-Day Exploited in Asian Government Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbclqe/characterizing_abusive_ip_proxies/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:45:18.000Z</news:publication_date>
      <news:title>Characterizing Abusive IP Proxies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:30:53.000Z</news:publication_date>
      <news:title>In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/critical-sharefile-flaws-lead-to-unauthenticated-rce/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:12:22.000Z</news:publication_date>
      <news:title>Critical ShareFile Flaws Lead to Unauthenticated RCE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbbpb3/how_to_structure_pcaps/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:04:20.000Z</news:publication_date>
      <news:title>How to structure PCAPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/crowdstrike-falcon-ingest-microsoft-defender-telemetry</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:53:15.000Z</news:publication_date>
      <news:title>CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbbefe/what_16_security_engines_found_in_2900_mcp_servers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:50:02.000Z</news:publication_date>
      <news:title>What 16 security engines found in 2,900 MCP servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/windows-secure-boot-certificate-update-2026-expiration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:43:26.000Z</news:publication_date>
      <news:title>Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbb7o3/agent_armor_open_source_zero_trust_runtime_for_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:40:53.000Z</news:publication_date>
      <news:title>Agent Armor: open source zero trust runtime for AI agents — protocol DPI, taint tracking, policy verification (Rust</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbb5k7/claude_code_leak_exploit_researchers_found_3/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:37:58.000Z</news:publication_date>
      <news:title>Claude Code Leak -&gt; Exploit? Researchers found 3 shell injection bugs in the leaked source — all using shell:true with unsanitized input</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbb4u0/anthropic_leak_reveals_cybersecurity_danger_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:36:55.000Z</news:publication_date>
      <news:title>Anthropic leak reveals cybersecurity danger and potential of new model</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-still-working-to-fix-exchange-online-mailbox-access-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:25:20.000Z</news:publication_date>
      <news:title>Microsoft still working to fix Exchange Online mailbox access issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbasol/microsofts_newest_opensource_project_runtime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:19:18.000Z</news:publication_date>
      <news:title>Microsoft's newest open-source project: Runtime security for AI agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:04:00.000Z</news:publication_date>
      <news:title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbah89/crtp_results/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:02:26.000Z</news:publication_date>
      <news:title>CRTP results</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/mobile-attack-surface-expands-as-enterprises-lose-control/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:00:00.000Z</news:publication_date>
      <news:title>Mobile Attack Surface Expands as Enterprises Lose Control</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:00:00.000Z</news:publication_date>
      <news:title>Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/react2shell-exploited-in-large-scale-credential-harvesting-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:55:13.000Z</news:publication_date>
      <news:title>React2Shell Exploited in Large-Scale Credential Harvesting Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/claude-code-leak-github-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:54:38.000Z</news:publication_date>
      <news:title>Claude Code source leak exploited to spread malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sba0kh/what_signals_tell_you_that_a_process_is_about_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:37:36.000Z</news:publication_date>
      <news:title>What signals tell you that a process is “about to break” even if it hasn’t yet?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/t-mobile-sets-the-record-straight-on-latest-data-breach-filing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:30:00.000Z</news:publication_date>
      <news:title>T-Mobile Sets the Record Straight on Latest Data Breach Filing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb9e56/apple_expands_updates_to_ios_18_devices_affected/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:02:09.000Z</news:publication_date>
      <news:title>Apple expands updates to iOS 18 devices affected by DarkSword exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb9amr/trivy_supply_chain_attack_teampcp_cicd_trust/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:56:51.000Z</news:publication_date>
      <news:title>Trivy Supply Chain Attack (TeamPCP) — CI/CD Trust Abuse, Tag Poisoning, and Credential Theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/north-korean-hackers-drain-285-million-from-drift-in-10-seconds/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:46:06.000Z</news:publication_date>
      <news:title>North Korean Hackers Drain $285 Million From Drift in 10 Seconds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:10:00.000Z</news:publication_date>
      <news:title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/man-admits-to-extortion-plot-locking-coworkers-out-of-thousands-of-windows-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:04:54.000Z</news:publication_date>
      <news:title>Man admits to locking thousands of Windows devices in extortion plot</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:00:00.000Z</news:publication_date>
      <news:title>CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:35:00.000Z</news:publication_date>
      <news:title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sb7pr4/new_rce_in_control_web_panel_cve202570951/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:20:58.000Z</news:publication_date>
      <news:title>New RCE in Control Web Panel (CVE-2025-70951)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sb7man/a_threat_actor_who_goes_by_the_name_mr_raccoon/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:14:57.000Z</news:publication_date>
      <news:title>A threat actor who goes by the name "Mr. Raccoon" has claimed to hack Adobe support via 3rd party Indian BPO firm</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:00:00.000Z</news:publication_date>
      <news:title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-now-force-upgrades-unmanaged-windows-11-24h2-pcs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:55:40.000Z</news:publication_date>
      <news:title>Microsoft now force upgrades unmanaged Windows 11 24H2 PCs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/aperion-smartflow-sdk-ai-governance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:06:01.000Z</news:publication_date>
      <news:title>APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/european-commission-cloud-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T06:34:00.000Z</news:publication_date>
      <news:title>Trivy supply chain attack enabled European Commission cloud breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T06:33:34.000Z</news:publication_date>
      <news:title>CERT-EU: European Commission hack exposes data of 30 EU entities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb58if/timeline_inconsistencies_in_strategy_review_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:52:12.000Z</news:publication_date>
      <news:title>Timeline inconsistencies in strategy review data and issues of data reliability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb54kp/does_anyone_here_work_as_a_security_engineer_at/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:46:05.000Z</news:publication_date>
      <news:title>Does anyone here work as a security engineer at google India ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/microsoft-ai-agent-governance-toolkit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:30:38.000Z</news:publication_date>
      <news:title>Microsoft releases open-source toolkit to govern autonomous AI agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/android-permissions-privacy-risks-research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:00:19.000Z</news:publication_date>
      <news:title>Which messaging app takes the most limited approach to permissions on Android?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb45bw/first_analysis_detection_pack_for_the_claude_code/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:52:09.000Z</news:publication_date>
      <news:title>First analysis &amp; detection pack for the Claude Code source leak</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb42qh/adobe_data_breach_2026_via_indian_bpo_support/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:48:18.000Z</news:publication_date>
      <news:title>Adobe Data Breach 2026 via Indian BPO support firm by "Mr. Raccoon"</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/thales-digital-trust-trends-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:30:22.000Z</news:publication_date>
      <news:title>Click, wait, repeat: Digital trust erodes one login at a time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/new-infosec-products-of-the-month-march-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:00:58.000Z</news:publication_date>
      <news:title>New infosec products of the month: March 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb1o5p/why_are_graphics_drivers_exempted_from_codeql/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:48:04.000Z</news:publication_date>
      <news:title>Why are graphics drivers exempted from CodeQL?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb1cgb/cnssi_and_jsig_rmf_training/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:32:30.000Z</news:publication_date>
      <news:title>CNSSI and JSIG RMF training?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb15mr/georgia_tech_or_rit_for_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:23:41.000Z</news:publication_date>
      <news:title>Georgia Tech or RIT for cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32862</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sazvie/built_an_offline_ai_pentest_assistant_in_python/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T01:24:32.000Z</news:publication_date>
      <news:title>Built an offline AI pentest assistant in Python — local LLM analyzes nmap/whois results and saves findings to MariaDB</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saxz7s/potential_technical_sr_cybersecurity_advisor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:58:58.000Z</news:publication_date>
      <news:title>Potential Technical SR. Cybersecurity Advisor interview tommorow any tips? things to go over?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1saxmi2/sophisticated_crystalx_rat_emerges_it_is_written/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:43:23.000Z</news:publication_date>
      <news:title>Sophisticated CrystalX RAT Emerges - It Is Written in Go</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saxg40/malicious_compliance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:35:36.000Z</news:publication_date>
      <news:title>Malicious Compliance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saxf2r/philosophical_question_best_way_to_handle/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:34:25.000Z</news:publication_date>
      <news:title>Philosophical Question: Best Way to Handle Phishing on Shared Email? One or the other.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1saxedk/detailed_analysis_of_a_sophisticated_firefox/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:33:35.000Z</news:publication_date>
      <news:title>Detailed analysis of a sophisticated firefox extension malware found in the wild using browser-xpi-malware-scanner.py</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sax2x7/leapstackvn_data_breach_approximately_100_gb_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:19:44.000Z</news:publication_date>
      <news:title>leapstack.vn: Data Breach Approximately 100 GB of health insurance claims accidentally exposed on an unprotected server | by chum1ng0 | Apr, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/backblaze-cloud-storage-benchmark-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T22:15:02.000Z</news:publication_date>
      <news:title>AWS, Wasabi, Cloudflare, and Backblaze go head-to-head in new cloud storage test</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sauzwt/dealing_with_a_rat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:54:29.000Z</news:publication_date>
      <news:title>dealing with a RAT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/geopolitics-ai-cybersecurity-insights-rsac-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:14:27.000Z</news:publication_date>
      <news:title>Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/uncanny-valley-podcast-iran-targets-us-tech-polymarket-pop-up-trump-midterms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:04:22.000Z</news:publication_date>
      <news:title>‘Uncanny Valley’: Iran’s Threats on US Tech, Trump’s Plans for Midterms, and Polymarket’s Pop-up Flop</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1satohk/built_a_browserbased_experiment_that_turns_files/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:03:25.000Z</news:publication_date>
      <news:title>Built a browser-based experiment that turns files into a deterministic “sonic fingerprint”</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ice-using-paragon-spyware-house-democrats-letter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:02:02.000Z</news:publication_date>
      <news:title>House Dems decry confirmed ICE usage of Paragon spyware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:30:55.000Z</news:publication_date>
      <news:title>Claude Code leak used to push infostealer malware on GitHub</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/toying-around-hasbro-attack-remediate</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:28:36.000Z</news:publication_date>
      <news:title>Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/securing-the-supply-chain-how-sentinelones-ai-edr-stops-the-axios-attack-autonomously/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:50:56.000Z</news:publication_date>
      <news:title>Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:30:00.000Z</news:publication_date>
      <news:title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sar44h/what_should_i_do/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:26:36.000Z</news:publication_date>
      <news:title>What should I do</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/security-bosses-all-in-ai</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:12:45.000Z</news:publication_date>
      <news:title>Security Bosses Are All-In on AI. Here's Why</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/drift-loses-280-million-as-hackers-seize-security-council-powers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:03:39.000Z</news:publication_date>
      <news:title>Drift loses $280 million as hackers seize Security Council powers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/drift-loses-280-million-north-korean-hackers-seize-security-council-powers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:03:39.000Z</news:publication_date>
      <news:title>Drift loses $280 million North Korean hackers seize Security Council powers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sapwdq/any_good_opensource_vulnerability_scanning_tools/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:42:00.000Z</news:publication_date>
      <news:title>Any good open-source vulnerability scanning tools?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saprt3/new_attack_pattern_persistent_prompt_injection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:37:26.000Z</news:publication_date>
      <news:title>New attack pattern: persistent prompt injection via npm supply chain targeting AI coding assistants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sap55k/accidentally_downloaded_a_sketchy_pdf_converter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:14:24.000Z</news:publication_date>
      <news:title>Accidentally downloaded a sketchy pdf converter</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/heres-what-can-happen-when-the-us-bombs-irans-nuclear-sites/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:08:08.000Z</news:publication_date>
      <news:title>Here's What Can Happen When the US Bombs Iran's Nuclear Sites</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/critical-vulnerability-in-claude-code-emerges-days-after-source-leak/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:00:55.000Z</news:publication_date>
      <news:title>Critical Vulnerability in Claude Code Emerges Days After Source Leak</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sans8y/sha_pinning_is_not_enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:25:33.000Z</news:publication_date>
      <news:title>SHA Pinning Is Not Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sanrxx/research_we_found_mcp_servers_telling_ai_agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:25:13.000Z</news:publication_date>
      <news:title>[Research] We found MCP servers telling AI agents to act "secretly", skip financial approvals, and hide actions from users. Census of 15,982 packages.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/drift-crypto-confirms-280-million-stolen-north-korea</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:25:00.000Z</news:publication_date>
      <news:title>Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/french-senate-passes-bill-child-ban-social-media</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:48:00.000Z</news:publication_date>
      <news:title>French Senate passes bill that would ban children under 15 from social media</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1samfe9/turning_a_raspberry_pi_into_a_poor_mans/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:36:47.000Z</news:publication_date>
      <news:title>Turning a Raspberry Pi into a "Poor Man's" Enterprise IDS/NSM using Zeek and Suricata</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sam980/red_team_sandbox_with_real_detection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:30:34.000Z</news:publication_date>
      <news:title>red team sandbox with real detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/akira-ransomware-initial-access-to-encryption-in-hours/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:26:04.000Z</news:publication_date>
      <news:title>Akira ransomware group can achieve initial access to data encryption in less than an hour</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sam1s2/the_meta_sev1_incident_this_week_is_being_written/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:23:08.000Z</news:publication_date>
      <news:title>The Meta SEV1 incident this week is being written off as a one-off. I think it's a template.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/apple-rolls-out-darksword-exploit-protection-to-more-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:18:07.000Z</news:publication_date>
      <news:title>Apple Rolls Out DarkSword Exploit Protection to More Devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/labor-department-cybersecurity-workforce-apprenticeships/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:14:04.000Z</news:publication_date>
      <news:title>Lawmakers renew push for Labor Department-backed cyber apprenticeship grants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1salrp7/i_have_2_years_in_a_soc_monitoring_web_traffic_s/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:13:03.000Z</news:publication_date>
      <news:title>I have 2 years in a SOC monitoring web traffic, S+ again or CYSA?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/02/threat-actor-abuse-of-ai-accelerates-from-tool-to-cyberattack-surface/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:00:00.000Z</news:publication_date>
      <news:title>Threat actor abuse of AI accelerates from tool to cyberattack surface</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/rsac-2026-ai-dominates-community</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:56:32.000Z</news:publication_date>
      <news:title>RSAC 2026: AI Dominates, But Community Remains Key to Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/02/cookie-controlled-php-webshells-tradecraft-linux-hosting-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:37:22.000Z</news:publication_date>
      <news:title>Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sakil4/is_macos_actually_more_secure_or_just_less_visible/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:27:05.000Z</news:publication_date>
      <news:title>Is macOS actually more secure or just less visible?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/residential-proxies-evaded-ip-reputation-checks-in-78-percent-of-4b-sessions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:21:02.000Z</news:publication_date>
      <news:title>Residential proxies evaded IP reputation checks in 78% of 4B sessions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:21:00.000Z</news:publication_date>
      <news:title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/medtech-giant-stryker-says-its-back-up-after-iranian-cyberattack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:18:52.000Z</news:publication_date>
      <news:title>Medtech giant Stryker says it’s back up after Iranian cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/supply-chain-hacks-data-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:16:06.000Z</news:publication_date>
      <news:title>Software supply chain hacks trigger wave of intrusions, data theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sak51u/the_linkedin_browsergate_attack_how_it_works/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:13:20.000Z</news:publication_date>
      <news:title>The [LinkedIn browsergate] Attack: How it works</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sajxo5/soc_1_analyst_technical_interview_coming_up_any/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:05:43.000Z</news:publication_date>
      <news:title>SOC 1 analyst technical interview coming up, any hidden gems?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32860</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:49:00.000Z</news:publication_date>
      <news:title>Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208), (Thu, Apr 2nd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/openssh-10-3-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:45:36.000Z</news:publication_date>
      <news:title>OpenSSH 10.3 patches five security bugs and drops legacy rekeying support</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/cybersecurity-ma-roundup-38-deals-announced-in-march-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:30:00.000Z</news:publication_date>
      <news:title>Cybersecurity M&amp;A Roundup: 38 Deals Announced in March 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:15:00.000Z</news:publication_date>
      <news:title>NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/storm-infostealer-remotely/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:15:00.000Z</news:publication_date>
      <news:title>New 'Storm' Infostealer Remotely Decrypts Stolen Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/apple-expands-darksword-patches-to-ios-18-7-7</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:13:44.000Z</news:publication_date>
      <news:title>Apple expands “DarkSword” patches to iOS 18.7.7</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saijad/canada_salaries/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:13:11.000Z</news:publication_date>
      <news:title>Canada Salaries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1saibe9/your_terminal_is_lying_to_you_escape_sequence/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:04:44.000Z</news:publication_date>
      <news:title>Your terminal is lying to you: escape sequence attacks from the 90s that still work.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:01:11.000Z</news:publication_date>
      <news:title>Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:00:00.000Z</news:publication_date>
      <news:title>vSphere and BRICKSTORM Malware: A Defender's Guide</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sahovj/need_cyber_liability_insurance_for_my_healthtech/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:39:38.000Z</news:publication_date>
      <news:title>Need Cyber Liability Insurance, for my Healthtech startup</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sahl4e/mongoose_preauth_rce_and_mtls_bypass_on_millions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:35:22.000Z</news:publication_date>
      <news:title>Mongoose: Preauth RCE and mTLS Bypass on Millions of Devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:33:11.000Z</news:publication_date>
      <news:title>New Progress ShareFile flaws can be chained in pre-auth RCE attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:30:00.000Z</news:publication_date>
      <news:title>Apple Expands iOS 18 Security Updates Amid DarkSword Threat</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-fully-operational-after-data-wiping-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:28:39.000Z</news:publication_date>
      <news:title>Medtech giant Stryker fully operational after data-wiping attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/red-hat-enterprise-linux-extended-life-cycle-premium/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:06:22.000Z</news:publication_date>
      <news:title>New Red Hat subscription simplifies long-term enterprise Linux support</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-identity-paradox-the-hidden-risks-in-your-valid-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:00:03.000Z</news:publication_date>
      <news:title>The Identity Paradox: The Hidden Risks in Your Valid Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/bank-trojan-casbaneiro-worms-latin-america</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:00:00.000Z</news:publication_date>
      <news:title>Bank Trojan 'Casbaneiro' Worms Through Latin America</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/product/2026/04/vpnsoftwareaudit</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:00:00.000Z</news:publication_date>
      <news:title>Malwarebytes Privacy VPN receives full third-party audit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:00:00.000Z</news:publication_date>
      <news:title>Researchers Observe Sub-One-Hour Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:00:00.000Z</news:publication_date>
      <news:title>GitHub Used as Covert Channel in Multi-Stage Malware Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:45:00.000Z</news:publication_date>
      <news:title>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &amp; 10 More Stories</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sag8h2/days_since_last_openclaw_cve/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:38:24.000Z</news:publication_date>
      <news:title>Days since last OpenClaw CVE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/cisco-patches-critical-and-high-severity-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:34:10.000Z</news:publication_date>
      <news:title>Cisco Patches Critical and High-Severity Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1safte6/my_firm_just_open_sourced_its_linux_edr_agent/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:18:53.000Z</news:publication_date>
      <news:title>My firm just open sourced its Linux EDR agent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1safq3a/we_set_up_vulnerability_scanning_and_now_we_have/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:14:40.000Z</news:publication_date>
      <news:title>We set up vulnerability scanning and now we have 400+ open findings with no idea what to fix first!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/02/cisa-adds-one-known-exploited-vulnerability-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds One Known Exploited Vulnerability to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1safcv9/til_hackers_stole_81_million_from_bangladesh_bank/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:58:07.000Z</news:publication_date>
      <news:title>TIL hackers stole $81 million from Bangladesh Bank using just 5 emails to the Federal Reserve. The money passed through 4 countries in under an hour. Most was never recovered.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/250000-affected-by-data-breach-at-nacogdoches-memorial-hospital/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:57:17.000Z</news:publication_date>
      <news:title>250,000 Affected by Data Breach at Nacogdoches Memorial Hospital</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saf8mi/howwhere_do_you_consume_threat_research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:52:23.000Z</news:publication_date>
      <news:title>How/where do you consume threat research?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:42:00.000Z</news:publication_date>
      <news:title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/manufacturing/eset-reports-78-of-uk-manufacturers-face-cyber-incidents-as-disruption-becomes-widespread/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:39:44.000Z</news:publication_date>
      <news:title>ESET reports 78% of UK manufacturers face cyber incidents as disruption becomes widespread</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:30:00.000Z</news:publication_date>
      <news:title>The State of Trusted Open Source Report</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/hitachi-digital-services-boosts-ot-it-integration-with-manufacturing-operations-management-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:20:23.000Z</news:publication_date>
      <news:title>Hitachi Digital Services boosts OT-IT integration with Manufacturing Operations Management platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/dragos-appoints-kaori-nieda-as-country-manager-to-push-market-expansion-in-japan/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:17:27.000Z</news:publication_date>
      <news:title>Dragos appoints Kaori Nieda as country manager to push market expansion in Japan</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/apple-ios-18-darksword-security-updates/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:11:43.000Z</news:publication_date>
      <news:title>DarkSword exploit forces Apple to loosen its patching policy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saecrr/youre_not_supposed_to_sharefile_with_everyone/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:07:24.000Z</news:publication_date>
      <news:title>You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 &amp; CVE-2026-2701) - watchTowr Labs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1saebwi/youre_not_supposed_to_sharefile_with_everyone/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:06:09.000Z</news:publication_date>
      <news:title>You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 &amp; CVE-2026-2701) - watchTowr Labs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/critical-cisco-imc-auth-bypass-gives-attackers-admin-access/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:01:14.000Z</news:publication_date>
      <news:title>Critical Cisco IMC auth bypass gives attackers Admin access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sae4y7/7655_ransomware_claims_in_one_year_group_sector/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:56:15.000Z</news:publication_date>
      <news:title>7,655 Ransomware Claims in One Year: Group, Sector, and Country Breakdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sae1z6/4_unpatched_cves_in_crewai_chain_prompt_injection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:51:47.000Z</news:publication_date>
      <news:title>4 unpatched CVEs in CrewAI chain prompt injection → sandbox bypass → RCE on host</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sady9s/created_a_simple_web_flasher_for_rayhunter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:46:05.000Z</news:publication_date>
      <news:title>created a simple web flasher for RayHunter</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sadw6m/i_built_an_opensource_vulnerability_scanner_that/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:42:58.000Z</news:publication_date>
      <news:title>I built an open-source vulnerability scanner that orchestrates Nmap, Nikto &amp; Nuclei</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/mercor-hit-by-litellm-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:42:05.000Z</news:publication_date>
      <news:title>Mercor Hit by LiteLLM Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sadnn1/does_having_a_robotstxt_open_an_attack_vector_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:30:02.000Z</news:publication_date>
      <news:title>Does having a robots.txt open an attack vector? And does using `Allow` instead of `Disallow` make any difference security-wise?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/border-patrol-bortac-borstar-use-of-force-midway-blitz/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:00:00.000Z</news:publication_date>
      <news:title>Unmasking the Paramilitary Agents Behind Trump’s Violent Immigration Crackdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sad42z/internship_selection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:59:32.000Z</news:publication_date>
      <news:title>Internship selection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/sophisticated-crystalx-rat-emerges/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:51:07.000Z</news:publication_date>
      <news:title>Sophisticated CrystalX RAT Emerges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:51:00.000Z</news:publication_date>
      <news:title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sacg2c/mdo_are_ms_antispam_capabilities_in_freefall/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:19:09.000Z</news:publication_date>
      <news:title>MdO - Are MS antispam capabilities in freefall?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-links-classic-outlook-bug-to-email-delivery-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:12:12.000Z</news:publication_date>
      <news:title>Microsoft links Classic Outlook issue to email delivery problems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/trueconf-zero-day-vulnerability-cyber-espionage/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:57:18.000Z</news:publication_date>
      <news:title>TrueConf zero-day vulnerability exploited to target government networks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/most-cni-firms-5m-downtime-ot/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:30:00.000Z</news:publication_date>
      <news:title>Most CNI Firms Face Up to £5m in Downtime from OT Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/over-14-000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:25:50.000Z</news:publication_date>
      <news:title>Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sabe7j/your_windows_clipboard_is_unprotected/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:14:05.000Z</news:publication_date>
      <news:title>Your Windows Clipboard Is Unprotected</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sab8d4/your_windows_clipboard_is_unprotected/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:04:01.000Z</news:publication_date>
      <news:title>Your Windows Clipboard Is Unprotected</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/variance-raises-21-5m-for-compliance-investigation-platform-powered-by-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:01:49.000Z</news:publication_date>
      <news:title>Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sab0a7/the_dow_zero_trust_learning_exchange_is_taking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:49:59.000Z</news:publication_date>
      <news:title>The DoW Zero Trust Learning Exchange is taking place next week</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saaogb/i_work_as_an_isso_heres_what_rmf_actually_looks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:29:12.000Z</news:publication_date>
      <news:title>I work as an ISSO, here’s what RMF actually looks like</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:09:00.000Z</news:publication_date>
      <news:title>Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/john-orourke-ppg-security-as-business-strategy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:30:40.000Z</news:publication_date>
      <news:title>Trust, friction, and ROI: A CISO’s take on making security work for the business</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sa8nld/cisco_source_code_stolen_by_shinyhunters_via/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:28:23.000Z</news:publication_date>
      <news:title>Cisco source code stolen by ShinyHunters via Trivy supply-chain attack. AWS keys breached, 300+ repos cloned and more</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa8ge3/major_cisco_source_code_breach_by_shinyhunters/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:17:09.000Z</news:publication_date>
      <news:title>Major Cisco Source Code breach by ShinyHunters. Linked to Trivy Supply-chain attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa8alh/sybil_attacks_during_reward_payouts_how_are_you/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:08:15.000Z</news:publication_date>
      <news:title>Sybil attacks during reward payouts: How are you guys closing the detection-to-block gap?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/5g-drone-detection-system-research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:00:14.000Z</news:publication_date>
      <news:title>Tracking drones with the 5G tower down the street</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa7tfz/what_are_your_thoughts_about_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:43:06.000Z</news:publication_date>
      <news:title>What are your thoughts about AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa7q4j/5_years_of_experience_at_microsoft_as_a_appsec/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:38:03.000Z</news:publication_date>
      <news:title>5 years of experience at Microsoft as a AppSec Engineer. What can I do next to become as resilient as possible?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/exchange-online-high-volume-email-hve/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:30:47.000Z</news:publication_date>
      <news:title>Microsoft adds high-volume email sending to Exchange Online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/linx-security-raises-50-million-for-identity-security-and-governance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:04:19.000Z</news:publication_date>
      <news:title>Linx Security Raises $50 Million for Identity Security and Governance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/02/customer-identity-fraud-detection-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:00:54.000Z</news:publication_date>
      <news:title>Your customer passed authentication. So why are they sending money to a scammer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa5qmt/ombs_latest_effort_to_empower_cios_reduce_shadow/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T02:59:58.000Z</news:publication_date>
      <news:title>OMB’s latest effort to empower CIOs, reduce shadow IT | Federal News Network</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa4l1b/securitygovernance_question_installing_endpoint/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T02:07:18.000Z</news:publication_date>
      <news:title>Security/governance question: Installing endpoint monitoring agent on admin systems without change control or documentation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32858</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa26fg/i_feel_like_a_huge_fraud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:19:36.000Z</news:publication_date>
      <news:title>I feel like a huge fraud.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa1st1/experience_with_kroll/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:02:59.000Z</news:publication_date>
      <news:title>Experience with Kroll?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:00:00.000Z</news:publication_date>
      <news:title>Latin America and the Caribbean Cybercrime Landscape</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/higher-order-detection-rules</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:00:00.000Z</news:publication_date>
      <news:title>Prioritizing Alerts Triage with Higher-Order Detection Rules</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/how-we-caught-the-axios-supply-chain-attack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:00:00.000Z</news:publication_date>
      <news:title>How we caught the Axios supply chain attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/linux-rootkits-2-caught-in-the-act</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:00:00.000Z</news:publication_date>
      <news:title>Hooked on Linux: Rootkit Detection Engineering</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/whatsapp-warns-users-of-fake-app-used-for-spyware</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:52:00.000Z</news:publication_date>
      <news:title>WhatsApp warns users of fake app used to distribute spyware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa12gv/is_cybersecurity_in_a_similar_boat_to_compsci/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:31:32.000Z</news:publication_date>
      <news:title>Is Cybersecurity in a similar boat to CompSci?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-crystalrat-malware-adds-rat-stealer-and-prankware-features/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:17:09.000Z</news:publication_date>
      <news:title>New CrystalRAT malware adds RAT, stealer and prankware features</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa0ghw/minimal_now_provides_easy_cve_count_details_page/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:05:40.000Z</news:publication_date>
      <news:title>Minimal now provides easy CVE count details page</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa0dth/cybersecurity_or_embedded_systems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:02:37.000Z</news:publication_date>
      <news:title>Cybersecurity or embedded systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sa02np/massachusetts_cyberattack_hits_pepperell_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T22:50:04.000Z</news:publication_date>
      <news:title>Massachusetts cyberattack hits Pepperell and regional dispatch</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1s9z3m3/are_smart_contract_audits_becoming_more/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T22:09:41.000Z</news:publication_date>
      <news:title>Are smart contract audits becoming more simulation-driven?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/ransomware-hospitals-preparation-key-defense</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T22:04:43.000Z</news:publication_date>
      <news:title>Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T21:50:49.000Z</news:publication_date>
      <news:title>Apple expands iOS 18 updates to more iPhones to block DarkSword attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1s9ym2h/logsentinol/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T21:50:45.000Z</news:publication_date>
      <news:title>LogSentinol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/ai/2026/04/wikipedias-ai-agent-row-likely-just-the-beginning-of-the-bot-ocalypse</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T21:49:55.000Z</news:publication_date>
      <news:title>Wikipedia&amp;#8217;s AI agent row likely just the beginning of the bot-ocalypse</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1s9ybbu/embedding_inversion_attacks_make_hosted_vector/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T21:39:12.000Z</news:publication_date>
      <news:title>Embedding inversion attacks make hosted vector databases a real data exposure risk, here's an encrypted alternative</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1s9ya0j/coolest_new_cyber_security_media_companies/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T21:37:54.000Z</news:publication_date>
      <news:title>Coolest (New?) Cyber Security Media Companies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-trueconf-zero-day-to-push-malicious-software-updates/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T21:35:47.000Z</news:publication_date>
      <news:title>Hackers exploit TrueConf zero-day to push malicious software updates</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1s9y5ic/novoice_android_malware_on_google_play_infected/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T21:33:05.000Z</news:publication_date>
      <news:title>'NoVoice' Android malware on Google Play infected 2.3 million devices</news:title>
    </news:news>
  </url>
</urlset>