<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sk79hw/the_dumbest_hack_of_the_year_exposed_a_very_real/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:50:55.000Z</news:publication_date>
      <news:title>The Dumbest Hack of the Year Exposed a Very Real Problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk6xc3/one_uppercase_letter_breaks_every_nuxt_app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:33:16.000Z</news:publication_date>
      <news:title>One Uppercase Letter Breaks Every Nuxt App</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/crosswalk-city-hack-cybersecurity-lessons/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:30:00.000Z</news:publication_date>
      <news:title>The Dumbest Hack of the Year Exposed a Very Real Problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/siemens-industrial-automation-datacenter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:20:10.000Z</news:publication_date>
      <news:title>Siemens expands Industrial Automation DataCenter with edge AI and cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/adobe-acrobat-reader-cve-2026-34621-emergency-fix/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:04:51.000Z</news:publication_date>
      <news:title>Adobe issues emergency fix for Acrobat Reader flaw exploited in the wild (CVE-2026-34621)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk6904/the_fbi_recovered_deleted_signal_messages_from_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:56:38.000Z</news:publication_date>
      <news:title>The FBI Recovered Deleted Signal Messages From an iPhone</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fake-claude-website-distributes-plugx-rat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:52:50.000Z</news:publication_date>
      <news:title>Fake Claude Website Distributes PlugX RAT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/dutch-police-veriftools-identity-fraud-arrests/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:39:44.000Z</news:publication_date>
      <news:title>Seized VerifTools servers expose 915,655 fake IDs, 8 arrested</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/north-koreas-apt37-uses-facebook-social.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:15:00.000Z</news:publication_date>
      <news:title>North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/associate-cyber-professional-title/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:15:00.000Z</news:publication_date>
      <news:title>UK Cyber Security Council Launches Associate Cyber Security Professional Title</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk575d/research_detecting_progressive_influence_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:53:45.000Z</news:publication_date>
      <news:title>[Research] Detecting progressive influence in conversation sequences (GL method + demo)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk56tc/building_a_soc_dashboard_for_a_project_what/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:53:12.000Z</news:publication_date>
      <news:title>Building a SOC dashboard for a project. What actually sucks about your current tools?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk54n5/cve20258061_from_userland_to_ring_0/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:49:34.000Z</news:publication_date>
      <news:title>CVE-2025-8061: From User-land to Ring 0</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/gmail-brings-end-to-end-encryption-to-android-and-ios-for-enterprise-users/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:31:33.000Z</news:publication_date>
      <news:title>Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk4j5o/cve20258061_from_userland_to_ring_0/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:13:44.000Z</news:publication_date>
      <news:title>CVE-2025-8061: From User-land to Ring 0</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:00:00.000Z</news:publication_date>
      <news:title>Operation Atlantic Seizes $12m in Crypto Losses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk46ht/일정한_입력_인터벌_패턴_어디까지_자동화로_보시나요/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:53:03.000Z</news:publication_date>
      <news:title>일정한 입력 인터벌 패턴, 어디까지 자동화로 보시나요?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk3yfa/are_there_tools_that_actually_verify_asset/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:39:19.000Z</news:publication_date>
      <news:title>Are there tools that actually verify asset inventory vs just discovering it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-april-6-april-12</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:02:00.000Z</news:publication_date>
      <news:title>A week in security (April 6 &amp;#8211; April 12)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/openai-revokes-macos-app-certificate.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:50:00.000Z</news:publication_date>
      <news:title>OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk30re/tired_of_the_anxiety_of_my_physical_private/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:44:27.000Z</news:publication_date>
      <news:title>Tired of the anxiety of my physical private getting leaked and the innumerable permissions asked by these journalling apps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk2aiq/what_mythos_reveals_about_zero_trusts_scope/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:02:37.000Z</news:publication_date>
      <news:title>What Mythos Reveals About Zero Trust’s Scope Problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/art-manion-tharros-vulnerability-data-quality/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:00:29.000Z</news:publication_date>
      <news:title>Fixing vulnerability data quality requires fixing the architecture first</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk1x6r/agentic_browser_security_indirect_prompt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:41:44.000Z</news:publication_date>
      <news:title>Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/zeroid-open-source-identity-platform-autonomous-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:30:40.000Z</news:publication_date>
      <news:title>ZeroID: Open-source identity platform for autonomous AI agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk1k6i/tool_to_automatically_harden_package_managers_npm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:21:38.000Z</news:publication_date>
      <news:title>Tool to automatically harden package managers (npm, pnpm, uv, yarn, bun) against software supply chain attacks (such as the axios or LiteLLM attacks)?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:00:20.000Z</news:publication_date>
      <news:title>MITRE releases a shared fraud-cyber framework built from real attack data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk0uxb/whatsapp_has_taken_video_of_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:43:58.000Z</news:publication_date>
      <news:title>whatsapp has taken video of me</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/globalsign-certificate-lifecycle-management-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:30:37.000Z</news:publication_date>
      <news:title>Why manual certificate management is running out of time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk0683/mysterious_link_on_a_financial_sites_login_page/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:08:43.000Z</news:publication_date>
      <news:title>Mysterious link on a financial site's login page</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/archit-lohokare-appviewx-ai-agent-identity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:00:00.000Z</news:publication_date>
      <news:title>Bringing governance and visibility to machine and AI identities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sjxzjx/hello_message_on_iphone_out_of_the_blue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T02:24:23.000Z</news:publication_date>
      <news:title>Hello message on iPhone out of the blue</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32890</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjxffw/irans_forced_nationwide_internet_blackout_becomes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T01:58:22.000Z</news:publication_date>
      <news:title>Iran's forced nationwide internet blackout becomes second-longest on record as it passes 1,000 hours offline — possessing Starlink terminals punishable by death, country using 'military-grade jamming' against service</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjwn5t/comptia_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T01:21:49.000Z</news:publication_date>
      <news:title>CompTIA Security+</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjvufs/is_it_realistic_to_achieve_income_from_bug/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T00:45:19.000Z</news:publication_date>
      <news:title>Is it realistic to achieve income from bug bounties?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjuvsj/made_an_ebpf_syscall_tracer_with_a_live_tui/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T00:01:56.000Z</news:publication_date>
      <news:title>Made an eBPF syscall tracer with a live TUI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjuucq/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T00:00:29.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjuohn/shadownet_v310_time_mastermisconception/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T23:53:08.000Z</news:publication_date>
      <news:title>ShadowNet v3.1.0 - Time Master/Misconception</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjta5x/i_built_mods_can_we_please_get_a_built_with_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:52:20.000Z</news:publication_date>
      <news:title>"I Built" - Mods, can we please get a "built with A.I" tag and enforce it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjt985/lost_in_a_roadmap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:51:13.000Z</news:publication_date>
      <news:title>Lost in a roadmap</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjsv99/is_tryhackme_premium_worth_in_2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:34:38.000Z</news:publication_date>
      <news:title>Is tryhackme premium worth in 2026?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/trisquel-12-0-ecne-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:03:13.000Z</news:publication_date>
      <news:title>The fully free Linux OS Trisquel gets a major update with version 12.0 Ecne</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjrjwu/akamai_glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T21:41:29.000Z</news:publication_date>
      <news:title>Akamai #Glasswing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjqtnk/nearly_800_hungarian_government_passwords_found/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T21:13:35.000Z</news:publication_date>
      <news:title>Nearly 800 Hungarian government passwords found exposed online ahead of election</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjqof6/i_built_a_windowsbased_web_security_waf_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T21:08:03.000Z</news:publication_date>
      <news:title>I built a Windows-based web security &amp; WAF testing tool – looking for feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjpe6f/rockstar_games_says_hack_will_have_no_impact/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T20:19:41.000Z</news:publication_date>
      <news:title>Rockstar Games says hack will have ‘no impact’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjpdtc/30_years_old_and_considering_tech_am_i_already/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T20:19:20.000Z</news:publication_date>
      <news:title>30 years old and considering tech… am I already too late?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjp4fm/books_recomendation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T20:09:36.000Z</news:publication_date>
      <news:title>Books recomendation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjouxv/thermaltakecom_hacked_with_a_clickfix_attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T19:59:54.000Z</news:publication_date>
      <news:title>thermaltake.com hacked with a ClickFix attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjnaa5/hackers_claim_control_over_venice_san_marco/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T19:01:42.000Z</news:publication_date>
      <news:title>Hackers claim control over Venice San Marco anti-flood pumps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjn4cc/adobe_fixes_actively_exploited_acrobat_reader/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T18:55:45.000Z</news:publication_date>
      <news:title>Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjmqq0/continue_in_soc_analyst_or_it_support/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T18:42:03.000Z</news:publication_date>
      <news:title>Continue in soc analyst or it support</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjl7gb/scott_bessent_calls_emergency_meeting_with_bank/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T17:44:55.000Z</news:publication_date>
      <news:title>Scott Bessent calls emergency meeting with bank CEOs over AI that could crash the financial system — what is Anthropic’s Mythos and why the panic?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sjkuu2/we_combined_dram_timing_attacks_electrical_grid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T17:31:41.000Z</news:publication_date>
      <news:title>We combined DRAM timing attacks, electrical grid frequency detection, and gyroscope fusion into a single bot detection stack and I think we need to talk about it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjjorv/backdoor_job_in_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:48:45.000Z</news:publication_date>
      <news:title>Backdoor job in IT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjjnk3/are_financial_institutions_underestimating/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:47:27.000Z</news:publication_date>
      <news:title>Are financial institutions underestimating cybersecurity risks?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sjioe3/reverse_engineered_silentsdk_rat_and_c2/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:11:04.000Z</news:publication_date>
      <news:title>Reverse engineered SilentSDK - RAT and C2 infrastructure found on beamers, sold on Amazon/AliExpress/eBay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjim7e/some_sort_of_bruteforcing_for_my_user_password/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:08:48.000Z</news:publication_date>
      <news:title>Some sort of brute-forcing for my user password?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sjim20/reverse_engineered_silentsdk_rat_and_c2/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:08:38.000Z</news:publication_date>
      <news:title>Reverse engineered SilentSDK - RAT and C2 infrastructure found on beamers, sold on Amazon/AliExpress/eBay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sji8lz/darktrace_technical_support_engineer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:54:41.000Z</news:publication_date>
      <news:title>Darktrace Technical Support Engineer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sji791/rate_my_pentesting_ai_still_in_very_early/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:53:13.000Z</news:publication_date>
      <news:title>Rate my pentesting ai (still in very early development)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjhuba/cpuz_hack_question/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:39:09.000Z</news:publication_date>
      <news:title>CPUZ Hack Question</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjhcko/help_refining_my_home_lab_project/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:20:27.000Z</news:publication_date>
      <news:title>Help refining my home lab project</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjgrfq/are_vulnerability_scanners_giving_too_much_noise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:58:08.000Z</news:publication_date>
      <news:title>Are vulnerability scanners giving too much noise or is it just us?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:20:31.000Z</news:publication_date>
      <news:title>Critical Marimo pre-auth RCE flaw now under active exploitation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjepsi/the_sad_decline_of_trenchant_exec_who_had/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:34:42.000Z</news:publication_date>
      <news:title>The Sad Decline of Trenchant Exec Who Had Everything, Before Deciding to Steal and Sell Zero Days to Russian Buyer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sjecf4/paying_google_to_hack_macos_users/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:18:44.000Z</news:publication_date>
      <news:title>Paying Google to Hack macOS Users?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjebzl/paying_google_to_hack_macos_users/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:18:13.000Z</news:publication_date>
      <news:title>Paying Google to Hack macOS Users?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjdsgs/im_aiming_to_become_a_soc_tier_1_analyst/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:54:49.000Z</news:publication_date>
      <news:title>I’m aiming to become a SOC Tier 1 analyst.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjdrdb/estudiar_ciberseguridad_relacionado/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:53:28.000Z</news:publication_date>
      <news:title>Estudiar ciberseguridad (relacionado)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjd6yg/certification_planning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:27:06.000Z</news:publication_date>
      <news:title>Certification Planning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjcy7q/two_different_attackers_poisoned_popular_open/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:15:16.000Z</news:publication_date>
      <news:title>Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjcy5i/advice_on_finding_an_internship/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:15:11.000Z</news:publication_date>
      <news:title>Advice on finding an internship</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjcqvz/ai_safe_cyber_vendors_and_future_of_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:05:44.000Z</news:publication_date>
      <news:title>AI Safe Cyber Vendors and Future of Cybersecurity Vendors</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjco9h/how_to_create_a_pgp_key_tordaily/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:02:25.000Z</news:publication_date>
      <news:title>How to create a pgp key - TorDaily</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjc8kt/zerodays_are_expensive_why_spend_them_when_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:40:42.000Z</news:publication_date>
      <news:title>Zero-days are expensive. Why spend them when the front door is already open.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjbjgp/how_do_hackers_actually_find_vulnerabilities_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:03:37.000Z</news:publication_date>
      <news:title>How do hackers actually find vulnerabilities in real applications?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sja9u1/is_a_realtime_aipowered_security_system_a_viable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T09:51:21.000Z</news:publication_date>
      <news:title>Is a real-time AI-powered security system a viable SaaS idea?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj8vgs/use_of_ai_in_soc_analyst_roles/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T08:28:07.000Z</news:publication_date>
      <news:title>Use of AI in SOC Analyst Roles</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/12/week-in-review-windows-zero-day-exploit-leaked-patch-tuesday-forecast/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T08:00:55.000Z</news:publication_date>
      <news:title>Week in review: Windows zero-day exploit leaked, Patch Tuesday forecast</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj8cb7/unknown_devices_connecting_to_our_iotonly_network/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:57:17.000Z</news:publication_date>
      <news:title>Unknown devices connecting to our IoT-only network — MAC address mismatch, need help investigating</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj8a2w/tiktok_app_traffic_protocols/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:53:51.000Z</news:publication_date>
      <news:title>Tiktok app traffic protocols</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/adobe-patches-reader-zero-day-exploited-for-months/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:45:26.000Z</news:publication_date>
      <news:title>Adobe Patches Reader Zero-Day Exploited for Months</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj81ve/cpuz_and_hwmonitor_watering_hole_infection_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:40:30.000Z</news:publication_date>
      <news:title>CPU-Z and HWMonitor watering hole infection – a copy-pasted attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj6v36/faang_security_engineer_getting_ready_for_layoffs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T06:33:31.000Z</news:publication_date>
      <news:title>FAANG security engineer getting ready for layoffs. For senior folks in this sub, how is my studying plan?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:54:00.000Z</news:publication_date>
      <news:title>CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/industrial-systems-face-structural-gap-as-quantum-risks-drive-urgency-for-crypto-agility-and-post-quantum-readiness/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:33:31.000Z</news:publication_date>
      <news:title>Industrial systems face structural gap as quantum risks drive urgency for crypto-agility and post-quantum readiness</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj5cqw/built_a_system_that_generates_signed_verification/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:10:12.000Z</news:publication_date>
      <news:title>Built a system that generates signed verification receipts for SBOMs — looking for feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sj5bp2/cheap_chinese_fake_iphone/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:08:37.000Z</news:publication_date>
      <news:title>cheap chinese fake iphone.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T04:25:00.000Z</news:publication_date>
      <news:title>Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj2ypx/information_security_learning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T03:08:28.000Z</news:publication_date>
      <news:title>Information security learning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siya8y/defeating_dpi_and_behavioral_heuristics_protocol/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T23:27:24.000Z</news:publication_date>
      <news:title>Defeating DPI and Behavioral Heuristics: Protocol Mimicry, W^X Injection, and DPCM-RLE Compression in Pure x64 Assembly</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sixcqt/private_repositories_questions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T22:46:50.000Z</news:publication_date>
      <news:title>Private repositories - Questions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1six9zn/cto_at_ncsc_summary_week_ending_april_12th/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T22:43:26.000Z</news:publication_date>
      <news:title>CTO at NCSC Summary: week ending April 12th</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siwx3o/need_urgent_advice_being_approached_by_suspicious/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T22:28:14.000Z</news:publication_date>
      <news:title>need urgent advice - being approached by suspicious individuals regarding my researches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1siw1gg/ai_screen_readers_as_an_emerging_attack_surface/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T21:51:22.000Z</news:publication_date>
      <news:title>AI screen readers as an emerging attack surface for sensitive web form inputs — Microsoft Copilot Vision reads page content in real time including what users type</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sivxng/netwatch_v0110_connection_list_filtering_paging/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T21:46:50.000Z</news:publication_date>
      <news:title>netwatch v0.11.0 — connection list filtering, paging, and Ollama Cloud for AI insights</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siu2y1/does_anyone_know_the_code_to_this_website_page/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:31:30.000Z</news:publication_date>
      <news:title>Does anyone know the code to this website page????</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sitxw0/zero_data_retention_is_not_optional_anymore/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:25:57.000Z</news:publication_date>
      <news:title>Zero Data Retention is not optional anymore</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sittc8/how_do_you_reliably_handleclose_popups_using/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:20:55.000Z</news:publication_date>
      <news:title>How do you reliably handle/close popups using Selenium in Python?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sitset/prioritising_large_nmap_scans_using_service/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:19:58.000Z</news:publication_date>
      <news:title>Prioritising large Nmap scans using service rarity and version grouping</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sitd4c/over_20000_crypto_fraud_victims_identified_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:03:30.000Z</news:publication_date>
      <news:title>Over 20,000 crypto fraud victims identified in international crackdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sit7ox/uk_oil_and_gas_company_zephyr_energy_loses_700k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T19:57:47.000Z</news:publication_date>
      <news:title>UK oil and gas company Zephyr Energy loses £700K to contractor payment fraud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siqstx/forensic_analysis_movie_streaming_website/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T18:26:33.000Z</news:publication_date>
      <news:title>Forensic Analysis Movie Streaming Website</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sippw8/devops_appreciation_thread/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T17:46:27.000Z</news:publication_date>
      <news:title>DevOps Appreciation Thread</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sioa3r/is_anthropic_mythos_coming_to_destroy_all_the_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:52:45.000Z</news:publication_date>
      <news:title>Is Anthropic Mythos coming to destroy all the IT market ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sinozm/optimizing_wazuh_scenarios_rules_and_soc_workflows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:30:21.000Z</news:publication_date>
      <news:title>Optimizing Wazuh: Scenarios, Rules, and SOC Workflows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1simla5/github_bogdanticu88threatmap_iac_threat_modeler/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T15:48:36.000Z</news:publication_date>
      <news:title>GitHub - bogdanticu88/threatmap: IaC threat modeler with STRIDE, MITRE ATT&amp;CK, and PASTA frameworks. REST API, GraphQL, and Docker support for Terraform, CloudFormation, and Kubernetes.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1silgxk/ideas_for_phd_in_autonomous_cyber_defense/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T15:04:51.000Z</news:publication_date>
      <news:title>Ideas for phd in Autonomous Cyber Defense</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T14:20:40.000Z</news:publication_date>
      <news:title>Over 20,000 crypto fraud victims identified in international crackdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sij8zo/hungary_officials_used_weak_passwords_exposed_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T13:33:40.000Z</news:publication_date>
      <news:title>Hungary officials used weak passwords exposed in breach dump</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siixkw/blue_team_question_how_would_you_detect_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T13:20:26.000Z</news:publication_date>
      <news:title>Blue team question: How would you detect a low-and-slow attacker blending into normal traffic?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siibay/discussion_in_your_cybersecurity_job_which/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T12:53:48.000Z</news:publication_date>
      <news:title>[Discussion] In your cybersecurity job, which day‑to‑day tasks feel needlessly repetitive?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sii9bw/opensource_crossmodal_and_multimodal_prompt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T12:51:21.000Z</news:publication_date>
      <news:title>Open-source cross-modal and multimodal prompt injection test suite. 38,000+ attack payloads across text, image, document, and audio modalities. Research-backed by OWASP LLM Top 10, CrossInject (ACM MM 2025), FigStep (AAAI 2025), DolphinAttack, and CSA 2026.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sihr2y/is_linkedin_actually_worth_it_or_does_it_just/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T12:27:36.000Z</news:publication_date>
      <news:title>Is LinkedIn actually worth it, or does it just make you feel behind?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sigrdp/anthropic_claude_mythos_preview_megathread/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T11:38:55.000Z</news:publication_date>
      <news:title>Anthropic Claude Mythos Preview megathread</news:title>
    </news:news>
  </url>
</urlset>