<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srwqpa/is_bug_bounty_actually_worth_it_for_new_comers_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:42:24.000Z</news:publication_date>
      <news:title>Is bug bounty actually worth it for new comers in 2026? Need real talk, not motivation.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srwp3b/title_spvm_gross_negligence_i_handed_pdq_20_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:40:49.000Z</news:publication_date>
      <news:title>Title: SPVM gross negligence: I handed PDQ 20 a frozen extortion node and a human trafficking threat. They laughed and closed the file</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-lotus-data-wiper-used-against-venezuelan-energy-utility-firms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:38:40.000Z</news:publication_date>
      <news:title>New Lotus data wiper used against Venezuelan energy, utility firms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/mozilla-used-anthropics-mythos-to-find-271-bugs-in-firefox/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:30:00.000Z</news:publication_date>
      <news:title>Mozilla Used Anthropic’s Mythos to Find and Fix 151 Bugs in Firefox</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srvr5x/how_to_build_a_career_in_hardware_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:08:15.000Z</news:publication_date>
      <news:title>How to build a career in hardware security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srvol6/two_new_critical_spinnaker_vulns_allow_rce_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:05:51.000Z</news:publication_date>
      <news:title>Two new critical Spinnaker vulns allow RCE and production access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sruoty/behavior_validation_for_agentic_ai_applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:32:46.000Z</news:publication_date>
      <news:title>Behavior validation for Agentic AI Applications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sru854/i_discovered_a_covert_wifienabled_camera/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:17:04.000Z</news:publication_date>
      <news:title>“I discovered a covert Wi-Fi–enabled camera concealed inside a power adapter in a hotel room. The device was transmitting live footage to an overseas server (likely China-based). No cctv footage, used vpn, hotel denies their involvement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srteqo/hacker_como_se_tornar_um/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:49:31.000Z</news:publication_date>
      <news:title>Hacker - como se tornar um ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/uk-regulator-to-probe-telegram-over-csam-allegations</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:46:00.000Z</news:publication_date>
      <news:title>UK regulator to probe Telegram, teen chat sites for potential child safety violations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/meta-is-sued-over-scam-ads-on-facebook-and-instagram/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:24:41.000Z</news:publication_date>
      <news:title>Meta Is Sued Over Scam Ads on Facebook and Instagram</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/ssh-brings-privx-ot-to-nokia-industrial-edge-to-secure-remote-access-in-ot-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:15:48.000Z</news:publication_date>
      <news:title>SSH brings PrivX OT to Nokia Industrial Edge to secure remote access in OT environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/txone-introduces-stellar-discover-to-extend-ot-security-from-discovery-to-risk-insight/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:15:14.000Z</news:publication_date>
      <news:title>TXOne introduces Stellar Discover to extend OT security from discovery to risk insight</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/industrial-defender-partners-with-kyron-to-boost-ot-resilience-and-nis2-readiness-in-france/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:14:56.000Z</news:publication_date>
      <news:title>Industrial Defender partners with KYrON to boost OT resilience and NIS2 readiness in France</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/semperis-extends-purple-knight-identity-security-assessment-tool-to-us-federal-defense-gcc-high-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:14:37.000Z</news:publication_date>
      <news:title>Semperis extends Purple Knight identity security assessment tool to US federal, defense GCC High environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srs3mh/who_is_rasoul_jalili_the_socalled_father_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:04:07.000Z</news:publication_date>
      <news:title>Who is Rasoul Jalili, the So-Called “Father of Filtering” of the Islamic Republic?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:03:09.000Z</news:publication_date>
      <news:title>Detection strategies across cloud and identities against infiltrating IT workers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/trojanized-android-handle-nfc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:00:00.000Z</news:publication_date>
      <news:title>Trojanized Android App Fuels New Wave of NFC Fraud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:46:00.000Z</news:publication_date>
      <news:title>22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/surge-bomgar-rmm-exploitation-demonstrates-supply-chain-risk</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:29:17.000Z</news:publication_date>
      <news:title>Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srqrcg/android_moto_5g/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:18:44.000Z</news:publication_date>
      <news:title>Android Moto 5G+</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/google-fixes-critical-rce-flaw-ai-based-antigravity-tool</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:00:50.000Z</news:publication_date>
      <news:title>Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srq47h/p4wned_how_insecure_defaults_in_perforce_expose/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:57:42.000Z</news:publication_date>
      <news:title>P4WNED: How Insecure Defaults in Perforce Expose Source Code Across the Internet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:53:59.000Z</news:publication_date>
      <news:title>‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srpyuj/p4wned_how_insecure_defaults_in_perforce_expose/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:52:27.000Z</news:publication_date>
      <news:title>P4WNED: How Insecure Defaults in Perforce Expose Source Code Across the Internet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srpyms/is_dlp_dspm_evolving/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:52:15.000Z</news:publication_date>
      <news:title>Is DLP / DSPM evolving?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srpwfs/i_needed_a_replacement_for_paul_jerimys_roadmap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:50:01.000Z</news:publication_date>
      <news:title>I needed a replacement for Paul Jerimy's roadmap so I built one for my students</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/third-us-security-expert-admits-helping-ransomware-gang/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:44:24.000Z</news:publication_date>
      <news:title>Third US Security Expert Admits Helping Ransomware Gang</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srpp79/runtime_security_for_ai_agents_is_becoming_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:42:54.000Z</news:publication_date>
      <news:title>Runtime security for AI agents is becoming a practical defense problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/ransomware-negotiator-pleads-guilty-to.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:00.000Z</news:publication_date>
      <news:title>Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srot2i/webpage_takedown/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:10:30.000Z</news:publication_date>
      <news:title>Webpage takedown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/dozens-of-malicious-crypto-apps-land-in-apple-app-store/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:05:01.000Z</news:publication_date>
      <news:title>Dozens of Malicious Crypto Apps Land in Apple App Store</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/fake-google-antigravity-downloads-are-stealing-accounts-in-minutes</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:04:51.000Z</news:publication_date>
      <news:title>Fake Google Antigravity downloads are stealing accounts in minutes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/stopping-fraud-at-each-stage-of-the-customer-journey-without-adding-friction/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:02:12.000Z</news:publication_date>
      <news:title>Stopping Fraud at Each Stage of the Customer Journey Without Adding Friction</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/gentlemen-ransomware-rapid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:00:00.000Z</news:publication_date>
      <news:title>The Gentlemen Ransomware Expands With Rapid Affiliate Growth</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/uk-probes-telegram-teen-chat-sites-over-csam-sharing-concerns/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:49:10.000Z</news:publication_date>
      <news:title>UK probes Telegram, teen chat sites over CSAM sharing concerns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sro7tb/do_users_rage_on_you_after_failing_phishing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:48:32.000Z</news:publication_date>
      <news:title>Do users rage on you after failing phishing campaign? "I didn't click the link" etc?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sro7g5/agentic_ai_is_now_the_1_attack_surface_nobody_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:48:11.000Z</news:publication_date>
      <news:title>Agentic AI is now the #1 attack surface nobody is talking about in enterprise SOCs — thoughts?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/eu-targets-russian-propaganda-networks-sanctions</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:48:00.000Z</news:publication_date>
      <news:title>EU targets two Russian propaganda networks with new sanctions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srnv4f/cisa_flags_new_sdwan_flaw_as_actively_exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:35:14.000Z</news:publication_date>
      <news:title>CISA flags new SD-WAN flaw as actively exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cloud-platform-vercel-says-company-breached-through-ai-tool</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:10:00.000Z</news:publication_date>
      <news:title>Cloud platform Vercel says company breached through third-party AI tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/unchecked-ai-agents-cause/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:00:00.000Z</news:publication_date>
      <news:title>Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/5-places-where-mature-socs-keep-mttr.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:00:00.000Z</news:publication_date>
      <news:title>5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/real-apple-notifications-are-being-used-to-drive-tech-support-scams</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:59:31.000Z</news:publication_date>
      <news:title>Real Apple notifications are being used to drive tech support scams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srmfq1/best_cyber_security_course_in_usa/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:38:41.000Z</news:publication_date>
      <news:title>Best Cyber Security Course in USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/unsecured-perforce-servers-expose-sensitive-data-from-major-orgs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:37:49.000Z</news:publication_date>
      <news:title>Unsecured Perforce Servers Expose Sensitive Data From Major Orgs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srmefq/seen_the_cyber_side_of_modern_conflicts_ask/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:37:06.000Z</news:publication_date>
      <news:title>Seen the cyber side of modern conflicts. Ask questions.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-flags-new-sd-wan-flaw-as-actively-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:30:50.000Z</news:publication_date>
      <news:title>CISA flags new SD-WAN flaw as actively exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srlvkn/ai_models_are_now_finding_bank_vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:14:38.000Z</news:publication_date>
      <news:title>AI Models Are Now Finding Bank Vulnerabilities Faster Than Regulators Can Respond</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/progress-patches-multiple-vulnerabilities-in-moveit-waf-loadmaster/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:14:26.000Z</news:publication_date>
      <news:title>Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1srluxa/iocx_v070_deterministic_heuristics_adversarial_pe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:13:50.000Z</news:publication_date>
      <news:title>IOCX v0.7.0 — deterministic heuristics + adversarial PE samples</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srlroo/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:43.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srlroo/sim_farms_as_a_service_a_shared_control_plane/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:43.000Z</news:publication_date>
      <news:title>SIM Farms as a Service: A Shared Control Plane Spanning 87 Farms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srlrbd/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:15.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srlrbd/a_single_platform_powers_sim_farm_proxy_networks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:15.000Z</news:publication_date>
      <news:title>A single platform powers SIM farm proxy networks across 17 countries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/chinese-apt-indian-banks-korean-policy</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:00:00.000Z</news:publication_date>
      <news:title>Chinese APT Targets Indian Banks, Korean Policy Circles</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srli4x/secure_boot_cert_renewal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:57:55.000Z</news:publication_date>
      <news:title>Secure Boot Cert renewal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srl68g/meetups_in_navi_mumbai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:43:04.000Z</news:publication_date>
      <news:title>Meetups in Navi Mumbai?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/no-exploit-needed-how-attackers-walk.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:30:00.000Z</news:publication_date>
      <news:title>No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srks4e/we_analysed_almost_100_uk_charity_websites_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:24:24.000Z</news:publication_date>
      <news:title>We analysed almost 100 UK charity websites and found that ~1 in 6 are running vulnerable JavaScript dependencies.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/organizations-warned-of-exploited-cisco-kentico-zimbra-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:19:45.000Z</news:publication_date>
      <news:title>Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/actively-exploited-apache-activemq-flaw-impacts-6-400-servers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:17:51.000Z</news:publication_date>
      <news:title>Actively exploited Apache ActiveMQ flaw impacts 6,400 servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkl9u/thinking_about_a_pivot_into_security_leadership/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:14:55.000Z</news:publication_date>
      <news:title>Thinking about a pivot into security leadership</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkig6/clearwater_library_computer_disruption_leads_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:11:01.000Z</news:publication_date>
      <news:title>Clearwater library computer disruption leads to felony charge</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkdae/misp_events_deletion/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:03:42.000Z</news:publication_date>
      <news:title>MISP events deletion?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkcyx/appsec_e_devsecops/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:03:16.000Z</news:publication_date>
      <news:title>AppSec e DevSecOps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/data-breaches-at-healthcare-organizations-in-illinois-and-texas-affect-600000/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:02:29.000Z</news:publication_date>
      <news:title>Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srk8me/how_can_i_start_my_path_in_soc_analysis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:57:38.000Z</news:publication_date>
      <news:title>How can I start my path in SOC analysis</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srk7l6/how_attackers_are_actually_getting_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:56:11.000Z</news:publication_date>
      <news:title>How Attackers Are Actually Getting In</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/ngate-campaign-targets-brazil.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:40:00.000Z</news:publication_date>
      <news:title>NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srjtur/why_forensic_readiness_is_emerging_as_a_real/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:36:08.000Z</news:publication_date>
      <news:title>Why forensic readiness is emerging as a real enterprise security market</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srjm74/hi_all_i_am_currently_in_a_grc_role_at_one_of_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:24:54.000Z</news:publication_date>
      <news:title>Hi all, I am currently in a GRC role at one of the top universities in EU. I in this post want some guidance on how do I transition into red teaming roles. Any guidance on this will be extremely helpful.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:22:00.000Z</news:publication_date>
      <news:title>Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/vect-formalizes-breachforums-and-teampcp-alliance-to-push-model-for-industrialized-ransomware-scale-raas-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:18:47.000Z</news:publication_date>
      <news:title>Vect formalizes BreachForums and TeamPCP alliance to push model for industrialized ransomware, scale RaaS operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/darktrace-identifies-zionsiphon-malware-engineered-for-ot-disruption-in-israeli-water-sector-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:15:48.000Z</news:publication_date>
      <news:title>Darktrace identifies ZionSiphon malware engineered for OT disruption in Israeli water sector environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/mobile/2026/04/android-17-ends-all-or-nothing-access-to-your-contacts</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:12:27.000Z</news:publication_date>
      <news:title>Android 17 ends all-or-nothing access to your contacts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:12:21.000Z</news:publication_date>
      <news:title>Former ransomware negotiator pleads guilty to BlackCat attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/cisa/cisa-warns-organizations-of-supply-chain-compromise-in-axios-npm-package-delivering-remote-access-trojan/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:11:54.000Z</news:publication_date>
      <news:title>CISA warns organizations of supply chain compromise in Axios npm package delivering remote access trojan</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/290-million-kelp-dao-crypto-heist-blamed-on-north-korea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:02:09.000Z</news:publication_date>
      <news:title>$290 Million Kelp DAO Crypto Heist Blamed on North Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/anthropic-mythos-vulnerability-discovery-op-ed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:00:00.000Z</news:publication_date>
      <news:title>Mythos can find the vulnerability. It can’t tell you what to do about it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/they-built-privacy-tool-grapheneos-now-sworn-enemies/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:00:00.000Z</news:publication_date>
      <news:title>They Built a Legendary Privacy Tool. Now They’re Sworn Enemies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srj393/ai_prompt_injection_the_new_security_nightmare/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:55:55.000Z</news:publication_date>
      <news:title>AI Prompt Injection: The New Security Nightmare</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srj1qm/full_day_technical_test_for_a_penetration_tester/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:53:28.000Z</news:publication_date>
      <news:title>Full day technical test for a penetration tester role - is that normal?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sriofz/first_cyber_sec_analyst_job_interview_with_asda_uk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:32.000Z</news:publication_date>
      <news:title>First cyber sec analyst job interview with Asda (UK).</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/vercel-cyber-incident-threat-actor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:10:00.000Z</news:publication_date>
      <news:title>Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sri8i7/research_microsoft_meta_google_shamelessly_track/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:05:30.000Z</news:publication_date>
      <news:title>Research: Microsoft, Meta, Google shamelessly track you even if you opt out</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/ngate-android-malware-uses-handypay-nfc-app-to-steal-card-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:00:00.000Z</news:publication_date>
      <news:title>NGate Android malware uses HandyPay NFC app to steal card data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/north-korean-blamed-290m-kelpdao/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T08:30:00.000Z</news:publication_date>
      <news:title>North Korean Blamed for $290m KelpDAO Crypto Heist</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srgsts/in_my_recent_projects_i_dont_rely_on_a_single_llm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:38:37.000Z</news:publication_date>
      <news:title>In my recent projects, I don’t rely on a single LLM for security analysis anymore.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32910</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:14:56.000Z</news:publication_date>
      <news:title>A .WAV With A Payload, (Tue, Apr 21st)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srfst6/i_need_url_of_discord_server_to_learn_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:40:24.000Z</news:publication_date>
      <news:title>I need url of discord server to learn cyber security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:23:00.000Z</news:publication_date>
      <news:title>CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sreu19/vercel_got_exploited_again/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:46:31.000Z</news:publication_date>
      <news:title>Vercel got exploited AGAIN</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sreoqm/how_important_is_reconnaissance_in_bug_bounties/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:38:35.000Z</news:publication_date>
      <news:title>How important is reconnaissance in bug bounties or actual hacking? When you do subdomain enumeration, etc., you only feel like you're getting further away from the actual target.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sreolc/command_execution_via_draganddrop_in_terminal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:38:22.000Z</news:publication_date>
      <news:title>Command Execution via Drag-and-Drop in Terminal Emulators</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srejs1/vertex_solutions_ai_cyber_security_app_vertex/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:31:12.000Z</news:publication_date>
      <news:title>Vertex Solutions AI Cyber Security App (Vertex Security)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srehuk/did_the_vercel_incident_change_your_threat_model/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:28:26.000Z</news:publication_date>
      <news:title>Did the Vercel incident change your threat model?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdltb/can_anybody_offer_a_more_detailed_tutorial_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:42:28.000Z</news:publication_date>
      <news:title>Can anybody offer a more detailed tutorial on using JtR password cracker</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdk07/being_gaslit_about_email_being_e2ee/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:39:49.000Z</news:publication_date>
      <news:title>Being gaslit about email being E2EE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdhrn/pictures_not_allowed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:36:31.000Z</news:publication_date>
      <news:title>Pictures not allowed?!?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdeu5/could_someone_tell_me_realistically_how_grc_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:32:14.000Z</news:publication_date>
      <news:title>Could someone tell me realistically how GRC is?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/securerouter-encrypted-ai-inference/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:30:41.000Z</news:publication_date>
      <news:title>Researchers build an encrypted routing layer for private AI inference</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdai8/why_selfattestation_is_the_biggest_weakness_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:25:52.000Z</news:publication_date>
      <news:title>Why "Self-Attestation" is the biggest weakness in current AI Governance (and how to fix it with telemetry)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srd29h/i_have_nothing_to_hide_the_last_words_of_every/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:14:16.000Z</news:publication_date>
      <news:title>“I Have Nothing to Hide” — The Last Words of Every Cybercrime Victim: Cybersecurity 101</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srcw4c/dose_it_only_happen_with_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:05:52.000Z</news:publication_date>
      <news:title>Dose it only happen with me ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/cybersecurity-jobs-available-right-now-april-21-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:00:53.000Z</news:publication_date>
      <news:title>Cybersecurity jobs available right now: April 21, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/crowdstrike-shadow-AI-visibility-service/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:00:00.000Z</news:publication_date>
      <news:title>Introducing the CrowdStrike Shadow AI Visibility Service</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1src7g4/i_made_a_demo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:32:33.000Z</news:publication_date>
      <news:title>I Made a Demo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srbffq/browser_extension_inventory_problem/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:56:10.000Z</news:publication_date>
      <news:title>Browser Extension Inventory problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sram3b/agentbom_0801_open_security_scanner_for_ai_supply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:19:28.000Z</news:publication_date>
      <news:title>Agent-bom 0.80.1: Open security scanner for AI supply chain: agents, MCP, containers, cloud, GPU, and runtime.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32916</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/research/emerging-enterprise-security-risks-of-ai</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:00:00.000Z</news:publication_date>
      <news:title>Emerging Enterprise Security Risks of AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr6hqg/which_is_the_best_to_share_private_files_securely/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:20:45.000Z</news:publication_date>
      <news:title>Which is the best to share private files securely? WeTransfer, anon.li, TresorIt...?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ukraine-sbu-busts-bot-farm-supplying-russian-spies</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:00:00.000Z</news:publication_date>
      <news:title>Ukraine busts ‘bot farm’ supplying thousands of fake Telegram accounts to Russian spies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/kelpdao-suffers-290-million-heist-tied-to-lazarus-hackers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:23:52.000Z</news:publication_date>
      <news:title>KelpDAO suffers $290 million heist tied to Lazarus hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr4m02/help_with_my_cve_request_on_vuldb/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:05:06.000Z</news:publication_date>
      <news:title>Help with my CVE request on Vuldb</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr4gnj/serialtoip_converter_flaws_expose_ot_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:59:28.000Z</news:publication_date>
      <news:title>Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/chinas-apple-app-store-infiltrated-by-crypto-stealing-wallet-apps/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:52:54.000Z</news:publication_date>
      <news:title>China's Apple App Store infiltrated by crypto-stealing wallet apps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/google-antigravity-pillar-security-agent-sandbox-escape-remote-code-execution/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:17:31.000Z</news:publication_date>
      <news:title>Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/vercel-employees-ai-tool-access-data-breach</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:31.000Z</news:publication_date>
      <news:title>Vercel Employee's AI Tool Access Led to Data Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ftc-ai-portolio-getting-bigger-take-it-down-voice-cloning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:00:27.000Z</news:publication_date>
      <news:title>The FTC’s AI portfolio is about to get bigger</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/ics-ot-security/serial-ip-devices-thousands-of-bugs</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:00:00.000Z</news:publication_date>
      <news:title>Serial-to-IP Devices Hide Thousands of Old and New Bugs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr2ba5/muffling_faraday_bags_impossible_to_find_anymore/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:41:06.000Z</news:publication_date>
      <news:title>Muffling Faraday Bags impossible to find anymore?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr28f5/vercels_security_breach_started_with_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:38:20.000Z</news:publication_date>
      <news:title>Vercel's security breach started with malware disguised as Roblox cheats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sr1z4w/analysis_of_the_april_2026_bookingcom_supply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:29:30.000Z</news:publication_date>
      <news:title>Analysis of the April 2026 Booking.com Supply Chain Breach and ClickFix Tactics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/vercel-security-breach-third-party-attack-context-ai-lumma-stealer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:24:40.000Z</news:publication_date>
      <news:title>Vercel’s security breach started with malware disguised as Roblox cheats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:02:37.000Z</news:publication_date>
      <news:title>The Gentlemen ransomware now uses SystemBC for bot-powered attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqzdi6/best_way_to_ramp_up_for_an_isso_role_in_about_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:08:52.000Z</news:publication_date>
      <news:title>Best way to ramp up for an ISSO role in about a month?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:43:49.000Z</news:publication_date>
      <news:title>Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqy077/vulnerability_summary_for_the_week_of_april_13/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:27:36.000Z</news:publication_date>
      <news:title>Vulnerability Summary for the Week of April 13, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/seiko-usa-website-defaced-as-hacker-claims-customer-data-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:22:31.000Z</news:publication_date>
      <news:title>Seiko USA website defaced as hacker claims customer data theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sqxnak/fender_studio_pro_8_crack_from_rutracker/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:16:51.000Z</news:publication_date>
      <news:title>Fender Studio Pro 8 crack from RuTracker installed a miner + RAT on my PC!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqx7df/british_scattered_spider_hacker_pleads_guilty_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:03:12.000Z</news:publication_date>
      <news:title>British Scattered Spider hacker pleads guilty to crypto theft charges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqx3i2/microsoft_teams_increasingly_abused_in_helpdesk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:00:15.000Z</news:publication_date>
      <news:title>Microsoft: Teams increasingly abused in helpdesk impersonation attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqwy84/pefile_maintainer_looking_for_samples_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:55:46.000Z</news:publication_date>
      <news:title>pefile maintainer looking for samples from VirusTotal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqw9w4/how_to_start_on_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:33:40.000Z</news:publication_date>
      <news:title>how to start on cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sqvz0w/vercel_breach_explained_oauth_risk_in_ai_saas/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:23:27.000Z</news:publication_date>
      <news:title>Vercel Breach Explained: OAuth Risk in AI + SaaS Environment</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqvx46/i_looking_out_to_build_a_really_strong_ctf_team/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:21:44.000Z</news:publication_date>
      <news:title>I looking out to build a really strong CTF Team</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:14:00.000Z</news:publication_date>
      <news:title>SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sqvg44/building_a_llm_honeypot_that_monitors_all_65535/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:05:38.000Z</news:publication_date>
      <news:title>Building a LLM honeypot that monitors all 65535 ports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/italian-regulator-fines-postal-service-orgs-15-million-privacy</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:51:00.000Z</news:publication_date>
      <news:title>Italian regulator fines national postal service orgs $15 million for data privacy violations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/crypto-north-korea-theft-kelp</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:45:00.000Z</news:publication_date>
      <news:title>Crypto infrastructure company blames $290 million theft on North Korean hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/bulletins/sb26-110</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:09:44.000Z</news:publication_date>
      <news:title>Vulnerability Summary for the Week of April 13, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/zionsiphon-malware-water/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:00:00.000Z</news:publication_date>
      <news:title>ZionSiphon Malware Targets Water Infrastructure Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/20/making-opportunistic-cyberattacks-harder-by-design/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:00:00.000Z</news:publication_date>
      <news:title>Making opportunistic cyberattacks harder by design</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqt6jw/having_trouble_bypassing_ssl_pinning_for_flutter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:48:09.000Z</news:publication_date>
      <news:title>Having trouble bypassing SSL pinning for flutter app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/serial-to-ip-converter-flaws-expose-ot-and-healthcare-systems-to-hacking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:42:22.000Z</news:publication_date>
      <news:title>Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/20/enterprise-patch-remediation-benchmark-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:30:00.000Z</news:publication_date>
      <news:title>Enterprise Remediation Benchmark: How Does Your Organization Compare?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/microsoft-teams-increasingly-abused-in-helpdesk-impersonation-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:11:24.000Z</news:publication_date>
      <news:title>Microsoft: Teams increasingly abused in helpdesk impersonation attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/formbook-malware-multiple/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:01:00.000Z</news:publication_date>
      <news:title>Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/vercel-breached/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:58:33.000Z</news:publication_date>
      <news:title>Vercel breached via compromised third-party AI tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/elon-musk-avoids-questioning-french-police-x-images-scandal</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:56:00.000Z</news:publication_date>
      <news:title>Elon Musk fails to appear for questioning by French police over sexualized AI images on X</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/whatsapp-leaks-user-metadata</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:33:35.000Z</news:publication_date>
      <news:title>WhatsApp Leaks User Metadata to Attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/podcast/2026/04/big-tech-can-stop-scams-they-just-dont-lock-and-code-s07e08</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:16:12.000Z</news:publication_date>
      <news:title>Big Tech can stop scams. They just don&amp;#8217;t (Lock and Code S07E08)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/france-cyberattack-agency-passports</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:15:00.000Z</news:publication_date>
      <news:title>Cyberattack at French identity document agency may have exposed personal data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqqe6o/secure_application_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:07:13.000Z</news:publication_date>
      <news:title>Secure application data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/the-backup-myth-that-is-putting-businesses-at-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:01:11.000Z</news:publication_date>
      <news:title>The backup myth that is putting businesses at risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/bluesky-blames-app-outage-on-ddos</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:57:00.000Z</news:publication_date>
      <news:title>Bluesky blames app outage on ‘sophisticated’ DDoS attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/mythos-an-ai-tool-too-powerful-for-public-release</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:54:02.000Z</news:publication_date>
      <news:title>Mythos: An AI tool too powerful for public release</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqpw78/data_breach_at_edtech_giant_mcgraw_hill_affects/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:49:04.000Z</news:publication_date>
      <news:title>Data breach at edtech giant McGraw Hill affects 13.5 million accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:41:00.000Z</news:publication_date>
      <news:title>⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge &amp; More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/british-scattered-spider-hacker-pleads-guilty-to-crypto-theft-charges/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:33:42.000Z</news:publication_date>
      <news:title>British Scattered Spider hacker pleads guilty to crypto theft charges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ai-powered-security-operations-axios-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:17:25.000Z</news:publication_date>
      <news:title>Why the Axios attack proves AI is mandatory for supply chain security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqosez/new_signatureless_detection_architecture_signal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:06:32.000Z</news:publication_date>
      <news:title>New Signature-less Detection Architecture: Signal Physics meets Network Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/mirai-variant-dvr-flaw-iot-botnet/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:01:00.000Z</news:publication_date>
      <news:title>Attackers Exploit DVR Command Injection Flaw to Deploy  Mirai-Based Botnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqohzc/mythos_as_hacking_tool_fuels_company_anxiety_over/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:55:03.000Z</news:publication_date>
      <news:title>Mythos as Hacking Tool Fuels Company Anxiety Over Cyber Defense</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqo0v9/anyone_know_if_sonar_did_layoffs_last_week/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:34:44.000Z</news:publication_date>
      <news:title>Anyone know if Sonar did layoffs last week?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/british-scattered-spider-hacker-pleads-guilty-in-the-us/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:21:16.000Z</news:publication_date>
      <news:title>British Scattered Spider Hacker Pleads Guilty in the US</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqnihu/cyber_range_windows_licensing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:12:50.000Z</news:publication_date>
      <news:title>Cyber range Windows licensing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-tests-file-explorer-speed-performance-improvements/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:04:02.000Z</news:publication_date>
      <news:title>Microsoft tests Windows Explorer speed, performance improvements</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/hacker-scattered-spider-guilty-plea</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:00:00.000Z</news:publication_date>
      <news:title>British hacker tied to Scattered Spider campaign pleads guilty in $8M scheme</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/20/supply-chain-compromise-impacts-axios-node-package-manager</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:00:00.000Z</news:publication_date>
      <news:title>​​Supply Chain Compromise Impacts Axios Node Package Manager​</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/20/cisa-adds-eight-known-exploited-vulnerabilities-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds Eight Known Exploited Vulnerabilities to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqmpga/bluetooth_tracker_hidden_in_a_postcard_and_mailed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:36:13.000Z</news:publication_date>
      <news:title>Bluetooth tracker hidden in a postcard and mailed to a warship exposed its location — $5 gadget put a $585 million Dutch ship at risk for 24 hours</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/hackers-abuse-qemu-for-defense-evasion/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:35:29.000Z</news:publication_date>
      <news:title>Hackers Abuse QEMU for Defense Evasion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/risk-management/wef-urges-intelligence-sharing-as-port-cyber-threats-outpace-siloed-defences/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:32:15.000Z</news:publication_date>
      <news:title>WEF urges intelligence sharing as port cyber threats outpace siloed defences</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/why-most-ai-deployments-stall-after-demo.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:30:00.000Z</news:publication_date>
      <news:title>Why Most AI Deployments Stall After the Demo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/medical/hscc-warns-ai-driven-supply-chains-are-outpacing-healthcare-cybersecurity-defenses-and-oversight-models/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:28:47.000Z</news:publication_date>
      <news:title>HSCC warns AI-driven supply chains are outpacing healthcare cybersecurity defenses and oversight models</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/new-ot-isac-advisory-exposes-critical-flaws-across-industrial-control-and-management-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:26:59.000Z</news:publication_date>
      <news:title>New OT-ISAC advisory exposes critical flaws across industrial control and management systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqmcdj/telia_location_data_leaked_through_telecom/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:18:39.000Z</news:publication_date>
      <news:title>Telia: Location data leaked through telecom signaling</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/athr-voice-phishing-ai-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:08:38.000Z</news:publication_date>
      <news:title>AI platform ATHR makes voice phishing a one-person job</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/bluesky-disrupted-by-sophisticated-ddos-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:06:59.000Z</news:publication_date>
      <news:title>Bluesky Disrupted by Sophisticated DDoS Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqm3go/should_i_do_ceh_if_i_can_get_it_for_free_worth_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:06:13.000Z</news:publication_date>
      <news:title>Should I do CEH if I can get it for free? Worth it or just waste of time?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqlxcm/vercel_just_got_hacked_and_it_raises_a_bigger/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:58:09.000Z</news:publication_date>
      <news:title>Vercel just got hacked and it raises a bigger question about AI and security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqlut7/vercel_breached_via_thirdparty_ai_tool/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:54:34.000Z</news:publication_date>
      <news:title>Vercel Breached via Third-Party AI Tool.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqlo3x/anyone_know_what_this_google_url_is_used_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:44:50.000Z</news:publication_date>
      <news:title>Anyone know what this google URL is used for?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://ics-cert.kaspersky.com/events/2026/04/20/kaspersky-ics-cert-experts-present-vulnerability-in-qualcomm-chips-at-black-hat-asia/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:44:30.000Z</news:publication_date>
      <news:title>Kaspersky ICS CERT experts present vulnerability in Qualcomm chips at Black Hat Asia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:42:00.000Z</news:publication_date>
      <news:title>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/senate-extends-surveillance-powers-until-april-30-after-chaotic-votes-in-house/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:32:13.000Z</news:publication_date>
      <news:title>Senate Extends Surveillance Powers Until April 30 After Chaotic Votes in House</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sql8z2/nasa_cfitsio_fuzzing_memory_corruptions_and_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:21:32.000Z</news:publication_date>
      <news:title>Nasa CFITSIO Fuzzing: Memory Corruptions and a Codex-Assisted Pipeline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/ai-software-security-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:00:14.000Z</news:publication_date>
      <news:title>Fracturing Software Security With Frontier AI Models</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/the-weird-twisting-tale-of-how-china-spied-on-alysa-liu-and-her-dad/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:00:00.000Z</news:publication_date>
      <news:title>The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/greynoise-traffic-surge-early-warning-system-network-edge-device-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:00:00.000Z</news:publication_date>
      <news:title>Network ‘background noise’ may predict the next big edge-device vulnerability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/half-of-the-6-million-internet-facing-ftp-servers-lack-encryption/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:41:04.000Z</news:publication_date>
      <news:title>Half of the 6 Million Internet-Facing FTP Servers Lack Encryption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-teams-client-launch-failures-caused-by-service-update/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:40:20.000Z</news:publication_date>
      <news:title>Microsoft pulls service update causing Teams launch failures</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:30:00.000Z</news:publication_date>
      <news:title>NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqk8pu/how_strict_are_cyber_insurance_compliance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:22:59.000Z</news:publication_date>
      <news:title>How strict are cyber insurance / compliance mandates on security awareness training completion?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://ics-cert.kaspersky.com/advisories/2026/04/20/qualcomm-chipsets-series-write-what-where-condition-vulnerability-in-bootrom/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:07:05.000Z</news:publication_date>
      <news:title>Qualcomm chipset series. Write-what-where Condition vulnerability in BootROM</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqjyrz/os_hackearon_desde_que_descargasteis_aplicaciones/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:06:16.000Z</news:publication_date>
      <news:title>¿Os hackearon desde que descargasteis aplicaciones en Artista Pirata?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqjwi1/discord_read_receipts_when_how_often_how_long/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:02:28.000Z</news:publication_date>
      <news:title>Discord Read Receipts: When, How Often, How Long | Paul Koeck</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/crypto-exchange-grinex-western/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:00:00.000Z</news:publication_date>
      <news:title>Crypto Exchange Grinex Blames Western Spies for $13m Theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.welivesecurity.com/en/ransomware/what-ransom-note-doesnt-say/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:00:00.000Z</news:publication_date>
      <news:title>What the ransom note won't say</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-updates-to-fix-windows-server-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:30:56.000Z</news:publication_date>
      <news:title>Microsoft releases emergency updates to fix Windows Server issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/next-js-creator-vercel-hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:30:13.000Z</news:publication_date>
      <news:title>Next.js Creator Vercel Hacked</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqjcxx/persistent_antitheft_solutions_for_realme_note_50/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:29:39.000Z</news:publication_date>
      <news:title>Persistent anti-theft solutions for Realme Note 50 to survive Hard Reset</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/meta-bug-bounty-portswigger-partnership/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:13:30.000Z</news:publication_date>
      <news:title>Meta and PortSwigger drive offensive security further to find what others miss</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/hackers-fail-to-exploit-flaw-in-discontinued-tp-link-routers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:50:01.000Z</news:publication_date>
      <news:title>Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqilli/i_dont_think_privacy_can_be_found_online_any/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:44:06.000Z</news:publication_date>
      <news:title>I don't think privacy can be found "online" any longer.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/researchers-detect-zionsiphon-malware.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:34:00.000Z</news:publication_date>
      <news:title>Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqidka/cloud_development_platform_vercel_confirms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:30:46.000Z</news:publication_date>
      <news:title>Cloud development platform Vercel confirms security breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-april-13-april-19</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:02:00.000Z</news:publication_date>
      <news:title>A week in security (April 13 &amp;#8211; April 19)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/frontier-ai-collapses-exploit-window-how-defenders-must-respond/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:00:00.000Z</news:publication_date>
      <news:title>Frontier AI Is Collapsing the Exploit Window. Here&amp;rsquo;s How Defenders Must Respond.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqhs31/any_budgetfriendly_ways_to_get_soc_2_compliance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:56:30.000Z</news:publication_date>
      <news:title>Any budget-friendly ways to get SOC 2 compliance?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqhrno/before_mythos_ruins_vulnerability_research_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:55:47.000Z</news:publication_date>
      <news:title>Before Mythos ruins vulnerability research for everyone. Here is a list all the CVE's I found (with some exploits).</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32914</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:43:22.000Z</news:publication_date>
      <news:title>Handling the CVE Flood With EPSS, (Mon, Apr 20th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/eu-sovereign-cloud-tender-180-million-eu/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:43:20.000Z</news:publication_date>
      <news:title>EU pushes for stronger cloud sovereignty, awards €180 million to four providers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqgp72/vercel_ioc_found_in_infostealer_related_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:55:50.000Z</news:publication_date>
      <news:title>Vercel IOC found in Infostealer related to Context employee, alleged source of hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqgg8z/found_an_account_takeover_that_had_been_running/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:42:02.000Z</news:publication_date>
      <news:title>Found an account takeover that had been running for 6 weeks during what should have been a boring license audit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqgfrd/ceh_certificate_renewal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:41:16.000Z</news:publication_date>
      <news:title>CEH certificate renewal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/smokedmeat-ci-cd-pipeline-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:30:15.000Z</news:publication_date>
      <news:title>SmokedMeat: Open-source tool shows what attackers do inside CI/CD pipelines</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/north-korean-job-interview-infiltration-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:00:52.000Z</news:publication_date>
      <news:title>How to spot a North Korean fake in a job interview</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/product-showcase-syncthing-private-file-synchronization-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T04:30:14.000Z</news:publication_date>
      <news:title>Product showcase: Syncthing for secure, private file synchronization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqebn8/advice_on_m365_certification_path_for_entrylevel/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T03:52:07.000Z</news:publication_date>
      <news:title>Advice on M365 Certification Path for Entry-Level Cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/vercel-breach-tied-to-context-ai-hack.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T03:35:00.000Z</news:publication_date>
      <news:title>Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqcufv/incident_response_playbook_for_vercel_compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:41:29.000Z</news:publication_date>
      <news:title>Incident Response Playbook for Vercel compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqc89q/a_17yearold_excel_vulnerability_is_currently/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:13:18.000Z</news:publication_date>
      <news:title>A 17-year-old Excel vulnerability is currently being exploited by threat actors, and it's been flagged by the US' cyber defence agency</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32912</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:00:03.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 20th, 2026 https://isc.sans.edu/podcastdetail/9898, (Mon, Apr 20th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqboj5/vercel_breach_linked_to_infostealer_infection_at/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T01:48:07.000Z</news:publication_date>
      <news:title>Vercel Breach Linked to Infostealer Infection at Context.ai</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqamsa/found_a_new_campaign_almost_the_hard_way/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T01:01:06.000Z</news:publication_date>
      <news:title>Found a new campaign (almost the hard way)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq9y63/a_circular_flow_model_for_agentic_ai_managing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T00:30:38.000Z</news:publication_date>
      <news:title>A Circular Flow Model for Agentic AI: Managing Recursive Risk and Operational Instability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq99py/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T00:00:11.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq6h27/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:59:30.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5rhl/qday_आ_रह_ह_indias_1000km_unhackable_network/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:30:45.000Z</news:publication_date>
      <news:title>Q-DAY आ रहा है! India's 1000km Unhackable Network | TruthSutra</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5e30/i_spent_7_days_evading_americas_82_million/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:16:11.000Z</news:publication_date>
      <news:title>I spent 7 days evading America’s 82 MILLION surveillance cameras</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5273/cómo_consigo_trabajo_en_el_sector_ti/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:03:35.000Z</news:publication_date>
      <news:title>¿Cómo consigo trabajo en el sector TI?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq4mzq/se_puede_vivir_económicamente_de_la_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:47:29.000Z</news:publication_date>
      <news:title>Se puede vivir económicamente de la cyber seguridad o haciendo pentesting?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq3tlw/anyone_else_facing_invalid_jwt_token_in_gcp_lab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:16:25.000Z</news:publication_date>
      <news:title>anyone else facing “invalid jwt token” in gcp lab in MCRTA?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq3p6g/i_evaluated_440_security_certifications_and_built/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:11:49.000Z</news:publication_date>
      <news:title>I evaluated 440+ security certifications and built a free comparison tool ... would love your honest feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2u0i/vercel_had_an_internal_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:38:48.000Z</news:publication_date>
      <news:title>Vercel had an Internal Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2e9r/zorvyn_scam_got_exposed_by_xorcist/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:22:04.000Z</news:publication_date>
      <news:title>Zorvyn Scam Got Exposed By XorCist !! 🚨</news:title>
    </news:news>
  </url>
</urlset>