<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf39zm/anthropic_opus_46_is_less_good_at_finding_vulns/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:48:55.000Z</news:publication_date>
      <news:title>Anthropic Opus 4.6 is less good at finding vulns than you might think</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:02:44.000Z</news:publication_date>
      <news:title>Russia Hacked Routers to Steal Microsoft Office Tokens</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:02:05.000Z</news:publication_date>
      <news:title>Max severity Flowise RCE vulnerability now exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/russian-state-linked-apt28-exploits.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:48:00.000Z</news:publication_date>
      <news:title>Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fbi-internet-crime-complaint-center-annual-cybercrime-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:47:46.000Z</news:publication_date>
      <news:title>Cybercrime losses jumped 26% to $20.9 billion in 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/the-new-rules-of-engagement-matching-agentic-attack-speed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:40:52.000Z</news:publication_date>
      <news:title>The New Rules of Engagement: Matching Agentic Attack Speed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf16o3/sandbox_app_like_anyrun_but_not_anyrun/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:36:59.000Z</news:publication_date>
      <news:title>sandbox app like "any.run" but not any.run?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:34:26.000Z</news:publication_date>
      <news:title>Trent AI Emerges From Stealth With $13 Million in Funding</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/national-security-vets-warn-section-702-authorization-delay</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:29:00.000Z</news:publication_date>
      <news:title>National security veterans warn against delays in FISA 702 reauthorization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/russian-hackers-router-hijacking-dns-credential-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:18:00.000Z</news:publication_date>
      <news:title>Russian hackers hijack internet traffic using vulnerable routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf0mci/aspiring_grc_analyst/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:17:05.000Z</news:publication_date>
      <news:title>Aspiring GRC analyst</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf04s0/i_built_a_recon_tool_that_turns_exposed_secrets/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:00:15.000Z</news:publication_date>
      <news:title>I built a recon tool that turns exposed secrets into real attack paths</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:52:00.000Z</news:publication_date>
      <news:title>Massachusetts hospital turning ambulances away after cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:51:22.000Z</news:publication_date>
      <news:title>Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sezrmc/javascript_runtime_instrumentation_via_chrome/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:47:25.000Z</news:publication_date>
      <news:title>JavaScript runtime instrumentation via Chrome DevTools Protocol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezqge/soc_practice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:46:13.000Z</news:publication_date>
      <news:title>Soc practice</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezhpr/your_agent_remembers_your_secrets_and_keys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:37:25.000Z</news:publication_date>
      <news:title>Your agent remembers your secrets and keys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/critical-flowise-vulnerability-in-attacker-crosshairs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:34:51.000Z</news:publication_date>
      <news:title>Critical Flowise Vulnerability in Attacker Crosshairs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/storm-1175-exploits-web-facing-systems-to-drive-ransomware-attacks-across-healthcare-and-services-in-us-uk-australia/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:33:01.000Z</news:publication_date>
      <news:title>Storm-1175 exploits web-facing systems to drive ransomware attacks across healthcare and services in US, UK, Australia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/malaysias-digital-growth-and-geopolitics-widen-cyber-attack-surface-raising-critical-infrastructure-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:22.000Z</news:publication_date>
      <news:title>Malaysia’s digital growth and geopolitics widen cyber attack surface, raising critical infrastructure risks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezakj/soc_hand_on_project/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:18.000Z</news:publication_date>
      <news:title>Soc hand on project</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:00.000Z</news:publication_date>
      <news:title>Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/finite-state-appoints-ann-miller-to-scale-product-security-and-software-supply-chain-strategy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:28:26.000Z</news:publication_date>
      <news:title>Finite State appoints Ann Miller to scale product security and software supply chain strategy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:15:00.000Z</news:publication_date>
      <news:title>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/gpu-based-rowhammer-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:05:00.000Z</news:publication_date>
      <news:title>GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/07/qualys-cloud-security-forecast-2026-risk-trends-insights</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:00:00.000Z</news:publication_date>
      <news:title>Signals from the Cloud Security Forecast 2026: Cloud Risk Is Scaling through Design, Not Disruption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:57:16.000Z</news:publication_date>
      <news:title>RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexzs6/we_finally_built_a_vulnerability_prioritization/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:43:19.000Z</news:publication_date>
      <news:title>We finally built a vulnerability prioritization system and now the real problems are showing up!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:36:44.000Z</news:publication_date>
      <news:title>Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/lies-damned-lies-cybersecurity-metrics</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:26:02.000Z</news:publication_date>
      <news:title>Lies, Damned Lies, and Cybersecurity Metrics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/severe-strongbox-vulnerability-patched-in-android/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:23:51.000Z</news:publication_date>
      <news:title>Severe StrongBox Vulnerability Patched in Android</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexcn2/how_do_you_work_with_downloads_from_untrusted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:19:43.000Z</news:publication_date>
      <news:title>How do you work with downloads from untrusted sources ? What are the safest practices to avoid malware and attacks?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexaln/feature_updatespatch_mgmt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:17:36.000Z</news:publication_date>
      <news:title>Feature updates/patch mgmt</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sewxk6/grafanaghost_bypasses_grafanas_ai_defenses/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:04:10.000Z</news:publication_date>
      <news:title>‘GrafanaGhost’ bypasses Grafana's AI defenses without leaving a trace</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/why-your-automated-pentesting-tool-just-hit-a-wall/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:01:11.000Z</news:publication_date>
      <news:title>Why Your Automated Pentesting Tool Just Hit a Wall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/uk-exposes-russian-cyber-unit-hacking-home-routers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>UK exposes Russian cyber unit hacking home routers to hijack internet traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:58:45.000Z</news:publication_date>
      <news:title>GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/grafanaghost-grafana-prompt-injection-vulnerability-data-exfiltration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:44:35.000Z</news:publication_date>
      <news:title>‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sewcwa/run_the_funnyappexe_and_youre_a_windows_admin_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:42:10.000Z</news:publication_date>
      <news:title>Run the FunnyApp.exe, and you’re a Windows admin. An unknown individual just dropped a zero-day exploit for elevating privileges on Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/acronis-mdr-by-acronis-tru/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:37:53.000Z</news:publication_date>
      <news:title>Acronis MDR by TRU brings 24/7 managed detection and response to MSPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/webinar-today-why-automated-pentesting-alone-is-not-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:19:29.000Z</news:publication_date>
      <news:title>Webinar Today: Why Automated Pentesting Alone Is Not Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/cloudflare-post-quantum-authentication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:35.000Z</news:publication_date>
      <news:title>Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/focusing-people-cybersecurity-rsac2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:00.000Z</news:publication_date>
      <news:title>Focusing on the People in Cybersecurity at RSAC 2026 Conference</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sev5qf/are_group_interviews_a_scam/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:54:35.000Z</news:publication_date>
      <news:title>Are group interviews a scam?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:46:00.000Z</news:publication_date>
      <news:title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seumfv/your_ai_agent_has_more_access_than_your_employees/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:41.000Z</news:publication_date>
      <news:title>Your AI Agent Has More Access Than Your Employees</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/webinar-how-to-close-identity-gaps-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:17:00.000Z</news:publication_date>
      <news:title>[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cyberattack-hits-northern-ireland-schools</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:04:00.000Z</news:publication_date>
      <news:title>Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/17bn-lost-to-cyber-fraud-warns-fbi/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:00:00.000Z</news:publication_date>
      <news:title>Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/microsoft-device-code-phishing-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:57:49.000Z</news:publication_date>
      <news:title>AI-enabled device code phishing campaign exploits OAuth flow for account takeover</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/traffic-violation-scams-swap-links-for-qr-codes-to-steal-your-card-details</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:57:37.000Z</news:publication_date>
      <news:title>Traffic violation scams swap links for QR codes to steal your card details</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sett79/microsoft_speech_lateral_movement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:55:29.000Z</news:publication_date>
      <news:title>Microsoft Speech - Lateral Movement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1setrdw/microsoft_speech_lateral_movement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:53:04.000Z</news:publication_date>
      <news:title>Microsoft Speech - Lateral Movement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/gpubreach-root-shell-access-achieved-via-gpu-rowhammer-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:31:38.000Z</news:publication_date>
      <news:title>GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/the-hidden-cost-of-recurring-credential.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:30:00.000Z</news:publication_date>
      <news:title>The Hidden Cost of Recurring Credential Incidents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sesllm/flowise_ai_agent_builder_under_active_cvss_100/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:55:02.000Z</news:publication_date>
      <news:title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:52:33.000Z</news:publication_date>
      <news:title>Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/data-breaches/2026/04/support-platform-breach-exposes-hims-hers-customer-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:45:50.000Z</news:publication_date>
      <news:title>Support platform breach exposes Hims &amp;amp; Hers customer data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ses0p6/need_some_help_to_grow/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:23:00.000Z</news:publication_date>
      <news:title>Need some help to grow</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/csis-flags-irans-shift-from-episodic-cyberattacks-to-sustained-campaign-against-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:18:55.000Z</news:publication_date>
      <news:title>CSIS flags Iran’s shift from episodic cyberattacks to sustained campaign against critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/microchip-secures-iec-62443-4-1-ml2-certification-as-regulatory-pressure-mounts-on-device-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:13:03.000Z</news:publication_date>
      <news:title>Microchip secures IEC 62443-4-1 ML2 certification as regulatory pressure mounts on device security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/storm1175-medusa-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:02:00.000Z</news:publication_date>
      <news:title>Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1serfuv/having_a_siem_does_not_mean_you_have_forensic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:50:16.000Z</news:publication_date>
      <news:title>Having a SIEM Does Not Mean You Have Forensic Readiness</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1serejf/pqaudit_scan_your_codebase_for_quantumvulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:48:06.000Z</news:publication_date>
      <news:title>pqaudit - scan your codebase for quantum-vulnerable cryptography</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/github-copilot-rubber-duck-cross-model-review/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:27:06.000Z</news:publication_date>
      <news:title>GitHub Copilot CLI gets a second-opinion feature built on cross-model review</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:26:00.000Z</news:publication_date>
      <news:title>Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/german-police-unmask-revil-ransomware-leader/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:24:40.000Z</news:publication_date>
      <news:title>German Police Unmask REvil Ransomware Leader</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seqwbz/i_built_an_autonomous_4agent_cve_redteam_loop/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:17:25.000Z</news:publication_date>
      <news:title>I built an autonomous 4-agent CVE red-team loop that runs overnight on an Android phone — no cloud, no GPU, BLAKE3-verified logs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/comp-ai-open-source-compliance-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:45:44.000Z</news:publication_date>
      <news:title>Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/openai-safety-fellowship-applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:39:52.000Z</news:publication_date>
      <news:title>OpenAI opens applications for an external AI safety research fellowship</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/new-gpubreach-attack-enables-full-cpu.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:38:00.000Z</news:publication_date>
      <news:title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seq5mg/chipsoft_website_is_offline/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:31:29.000Z</news:publication_date>
      <news:title>Chipsoft website is offline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/white-house-seeks-to-slash-cisa-funding-by-707-million/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:29:41.000Z</news:publication_date>
      <news:title>White House Seeks to Slash CISA Funding by $707 Million</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sep4hy/detecting_cicd_supply_chain_attacks_with_canary/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:27:50.000Z</news:publication_date>
      <news:title>Detecting CI/CD Supply Chain Attacks with Canary Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:35:00.000Z</news:publication_date>
      <news:title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:05:54.000Z</news:publication_date>
      <news:title>Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:56:00.000Z</news:publication_date>
      <news:title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1senj1s/결제_도용fraud_시도로_인한_트래픽_폭주_및_인프라_가용성_보호_전략/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:54:45.000Z</news:publication_date>
      <news:title>결제 도용(Fraud) 시도로 인한 트래픽 폭주 및 인프라 가용성 보호 전략</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1semz63/another_cryptominer_undected_by_windows_defender/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:23:57.000Z</news:publication_date>
      <news:title>Another cryptominer - undected by Windows Defender / ESET NOD32 and Malwarebytes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1semk5r/prompt_injection_detection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:01:36.000Z</news:publication_date>
      <news:title>Prompt Injection Detection?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/alec-summers-mitre-cwe-vulnerability-mapping/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:00:51.000Z</news:publication_date>
      <news:title>The case for fixing CWE weakness patterns instead of patching one bug at a time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/mimecast-api-email-security-protection-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:30:18.000Z</news:publication_date>
      <news:title>How Mimecast brings enterprise-grade email protection to API deployment</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1selt3a/metatron_ai_penetration_testing_assistant_open/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:22:28.000Z</news:publication_date>
      <news:title>Metatron -AI PENETRATION TESTING ASSISTANT (open source)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sellln/i_was_targeted_by_a_fake_job_interview_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:12:05.000Z</news:publication_date>
      <news:title>I was targeted by a fake job interview on Wellfound. Instead of becoming a victim I reverse-engineered the malware. Here's the full analysis: 571 encrypted config values decrypted, C2 and Sentry DSN exposed, DPRK/Contagious Interview attribution.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/google-llm-content-moderation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:00:57.000Z</news:publication_date>
      <news:title>Google study finds LLMs are embedded at every stage of abuse detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sejkxy/orewatch_opensource_malicious_package_scanner/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:37:34.000Z</news:publication_date>
      <news:title>OreWatch – open-source malicious package scanner across 6 ecosystems, now with an MCP server so your AI coding agent stops installing malware.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sej7hc/deepzero_an_automated_agentic_vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:20:41.000Z</news:publication_date>
      <news:title>DeepZero: An automated, agentic vulnerability research pipeline for finding kernel zero-days</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sej48f/deepzero_an_automated_llmghidra_pipeline_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:16:40.000Z</news:publication_date>
      <news:title>DeepZero: An automated LLM/Ghidra pipeline for finding BYOVD zero-days in Windows drivers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32872</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seimh0/schedule_reporting_use_cases_in_opencti/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T01:54:41.000Z</news:publication_date>
      <news:title>Schedule reporting use cases in OpenCTI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seifit/recurring_failure_patterns_when_testing_llmbacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T01:46:08.000Z</news:publication_date>
      <news:title>Recurring failure patterns when testing LLM-backed APIs from a security perspective</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1segtd7/discover_the_top_25_cybersecurity_companies_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T00:35:59.000Z</news:publication_date>
      <news:title>Discover the top 25 cybersecurity companies in the U.S. that are leading the fight against cyber threats.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:54:04.000Z</news:publication_date>
      <news:title>German authorities identify REvil and GangCrab ransomware bosses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sefbus/this_video_demonstrates_a_reproducible_googleside/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:32:50.000Z</news:publication_date>
      <news:title>This video demonstrates a reproducible Google‑side issue where the system restores data that the user has deleted. The behavior happens in real time. It is not a cache problem, not a UI refresh glitch, and not user error</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seenqt/fbi_ic3_report_finding_sim_swap_attacks_surging/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:05:14.000Z</news:publication_date>
      <news:title>FBI IC3 report- Finding: Sim swap attacks surging</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/rostelecom-cyberattack-disrupts-russian-internet-access</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:00:00.000Z</news:publication_date>
      <news:title>Cyberattack on telecom giant Rostelecom disrupts internet services across Russia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1see9fk/hackathon/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:49:15.000Z</news:publication_date>
      <news:title>Hack-a-Thon</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sede4m/disgruntled_researcher_leaks_bluehammer_windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:14:42.000Z</news:publication_date>
      <news:title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/modern-kubernetes-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:00:08.000Z</news:publication_date>
      <news:title>Understanding Current Threats to Kubernetes Environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:44:15.000Z</news:publication_date>
      <news:title>New GPUBreach attack enables system takeover via GPU rowhammer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/ai-assisted-supply-chain-attack-targets-github</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:38:53.000Z</news:publication_date>
      <news:title>AI-Assisted Supply Chain Attack Targets GitHub</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:12:01.000Z</news:publication_date>
      <news:title>Fortinet customers confront actively exploited zero-day, with a full patch still pending</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/axios-attack-complex-social-engineering-industrialized</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:55:44.000Z</news:publication_date>
      <news:title>Axios Attack Shows Social Complex Engineering Is Industrialized</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/fortinet-emergency-patch-forticlient-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:24:19.000Z</news:publication_date>
      <news:title>Fortinet Issues Emergency Patch for FortiClient Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cyber-fraud-surges-to-17-billion-fbi-ic3</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:24:00.000Z</news:publication_date>
      <news:title>FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sea5v2/is_it_realistic_to_make_consistent_income_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:14:10.000Z</news:publication_date>
      <news:title>Is it realistic to make consistent income from bug bounty programs?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/medusa-ransomware-group-zero-days-microsoft</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:08:00.000Z</news:publication_date>
      <news:title>Medusa ransomware group using zero-days to launch attacks within 24 hours of breach, Microsoft says</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/06/why-every-enterprise-needs-a-risk-operations-center-roc</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:00:57.000Z</news:publication_date>
      <news:title>Why Every Enterprise Needs a Risk Operations Center (ROC)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/big-tech-vows-to-continue-csam-scanning</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:20:00.000Z</news:publication_date>
      <news:title>Big tech vows to continue CSAM scanning in Europe despite expiration of law allowing it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:27.000Z</news:publication_date>
      <news:title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:24.000Z</news:publication_date>
      <news:title>Microsoft fixes Classic Outlook bug causing email delivery issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se8l4f/free_owasp_top_10_for_llm_applications_exercises/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:10.000Z</news:publication_date>
      <news:title>Free OWASP Top 10 for LLM Applications exercises for AI security training. Fully white-labeled for your teaching / learning needs, no strings attached</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se8h0q/responsible_disclosure_is_structurally_dead_not/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:15:31.000Z</news:publication_date>
      <news:title>Responsible disclosure is structurally dead — not dying. Here's the analysis and what replaces it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se7qle/the_fccs_recent_ban_on_new_foreignmade_consumer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:50:08.000Z</news:publication_date>
      <news:title>The FCC’s recent ban on new foreign-made consumer routers may not have an immediate impact for consumers, but one cybersecurity expert says it could have long-term consequences.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/iran-linked-password-spraying-campaign.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:37:00.000Z</news:publication_date>
      <news:title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/german-police-unmask-suspects-linked-revil-gandcrab</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:34:00.000Z</news:publication_date>
      <news:title>German police unmask two suspects linked to REvil ransomware gang</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/us-border-patrol-challenge-coins-nonprofits/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:16:27.000Z</news:publication_date>
      <news:title>Border Patrol Agents Sold Challenge Coins With ‘Charlotte’s Web’ Characters in Riot Gear</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se64xz/education_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:52:35.000Z</news:publication_date>
      <news:title>Education help</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-removes-support-and-recovery-assistant-from-windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:45:57.000Z</news:publication_date>
      <news:title>Microsoft removes Support and Recovery Assistant from Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se5x4i/fuse_powerful_wordlist_generator/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:45:09.000Z</news:publication_date>
      <news:title>Fuse: Powerful wordlist generator</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se5olb/what_does_your_daily_socmdr_work_look_like_3_yoe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:36:58.000Z</news:publication_date>
      <news:title>“What does your daily SOC/MDR work look like? (3 YOE, looking to compare), ready to switch?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/stalkerware-maker-receives-no-jail-time</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:33:00.000Z</news:publication_date>
      <news:title>First stalkerware maker prosecuted since 2014 receives no jail time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se59v2/memory_only_recovery_account_system/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:22:45.000Z</news:publication_date>
      <news:title>Memory only recovery account system</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:21:23.000Z</news:publication_date>
      <news:title>pcTattleTale stalkerware maker sentence includes fine, supervised release</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se4r27/cyber_secuiry_is_it_high_stress/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:04:09.000Z</news:publication_date>
      <news:title>Cyber secuiry is it high stress?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:56:01.000Z</news:publication_date>
      <news:title>Microsoft links Medusa ransomware affiliate to zero-day attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:35:03.000Z</news:publication_date>
      <news:title>Drift $280M crypto theft linked to 6-month in-person operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:34:17.000Z</news:publication_date>
      <news:title>Inside an AI‑enabled device code phishing campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1se3t0e/10_free_interactive_exercises_for_ai_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:30:05.000Z</news:publication_date>
      <news:title>10 free interactive exercises for AI security training. Fully white-labeled, no strings attached</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:24:00.000Z</news:publication_date>
      <news:title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/singapore-us-warn-of-fortinet-bug-exploited</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:20:00.000Z</news:publication_date>
      <news:title>Singapore, US warn of latest Fortinet bug being exploited in wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-fortinet-flaw-exploited-in-attacks-by-friday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:02:14.000Z</news:publication_date>
      <news:title>CISA orders feds to patch exploited Fortinet EMS flaw by Friday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:00:00.000Z</news:publication_date>
      <news:title>Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se2hdg/how_do_you_think/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:42:36.000Z</news:publication_date>
      <news:title>How do you think ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-deepmind-researchers-map-web-attacks-against-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:32:54.000Z</news:publication_date>
      <news:title>Google DeepMind Researchers Map Web Attacks Against AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se27dc/research_we_scanned_3471_mcp_servers_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:32:41.000Z</news:publication_date>
      <news:title>[RESEARCH] We scanned 3,471 MCP servers for invisible Unicode — GPT-5.4 follows hidden instructions 100% of the time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se263o/do_you_all_know_anybody_that_likes_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:23.000Z</news:publication_date>
      <news:title>Do you all know anybody that likes Microsoft Purview DLP?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/automated-credential-harvesting-campaign-react2shell</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:09.000Z</news:publication_date>
      <news:title>Automated Credential Harvesting Campaign Exploits React2Shell Flaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se21el/web_filtering_test_sites/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:26:40.000Z</news:publication_date>
      <news:title>Web filtering test sites</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se1qs6/using_cloudflares_postquantum_tunnel_to_protect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:16:00.000Z</news:publication_date>
      <news:title>Using Cloudflare’s Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NAS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se1nc3/why_is_the_worlds_web_encryption_100_dependent_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:12:26.000Z</news:publication_date>
      <news:title>Why is the world’s web encryption 100% dependent on a single US-based non-profit?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0z5o/has_anyone_used_cardinalops_tidal_cyber_picus_or/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:48:10.000Z</news:publication_date>
      <news:title>Has anyone used CardinalOps, Tidal Cyber, Picus, or AttackIQ for detection gap analysis and did they actually solve the prioritization problem?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se0u4e/trivy_supply_chain_attack_enabled_european/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:42:57.000Z</news:publication_date>
      <news:title>Trivy supply chain attack enabled European Commission cloud breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0n5h/passive_hid_monitor_that_scores_potentially/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:35:35.000Z</news:publication_date>
      <news:title>Passive HID monitor that scores potentially malicious keyboard-like USB devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0a4t/did_anyone_hear_about_this_linkedin_data_leak/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:21:54.000Z</news:publication_date>
      <news:title>Did anyone hear about this LinkedIn data leak?!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/cve-2026-35616-fortinet-forticlientems-improper-access-control-vulnerability-exploited-in-the</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:21:05.000Z</news:publication_date>
      <news:title>CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/shadow-ai-in-healthcare-is-here-to-stay</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:50.000Z</news:publication_date>
      <news:title>Shadow AI in Healthcare is Here to Stay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/why-simple-breach-monitoring-is-no-longer-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:02:12.000Z</news:publication_date>
      <news:title>Why Simple Breach Monitoring is No Longer Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdzev8/ai_empowered_vulnerability_scanner_tool_for_cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:49:53.000Z</news:publication_date>
      <news:title>AI Empowered Vulnerability scanner tool for cloud based application</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/owasp-genai-security-project-update-matrix</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:49:27.000Z</news:publication_date>
      <news:title>OWASP GenAI Security Project Gets Update, New Tools Matrix</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdylur/how_are_teams_thinking_about_security_for_llm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:17:10.000Z</news:publication_date>
      <news:title>How are teams thinking about security for LLM agents right now?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdykyq/how_do_most_orgs_cope_with_selinux/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:16:08.000Z</news:publication_date>
      <news:title>How do most orgs cope with SELinux?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdye93/cracking_a_malvertising_dga_from_the_device_side/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:08:32.000Z</news:publication_date>
      <news:title>Cracking a Malvertising DGA From the Device Side</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdyd16/weblet_a_security_focused_cms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:07:07.000Z</news:publication_date>
      <news:title>Weblet: A security focused CMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdy6s7/latest_interesting_cybersecurity_news_6th_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:00:07.000Z</news:publication_date>
      <news:title>Latest Interesting Cybersecurity News - 6th of April 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/multi-os-cyberattacks-how-socs-close.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:00:00.000Z</news:publication_date>
      <news:title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/weekly-recap-axios-hack-chrome-0-day.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:46:00.000Z</news:publication_date>
      <news:title>⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/threats-attacks/check-point-tracks-iranian-password-spraying-waves-targeting-government-and-energy-sectors-in-israel-and-uae/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:42:01.000Z</news:publication_date>
      <news:title>Check Point tracks Iranian password-spraying waves targeting government and energy sectors in Israel and UAE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/outage-hits-russian-banking-apps</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:37:00.000Z</news:publication_date>
      <news:title>Major outage hits Russian banking apps, metro payments across regions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/darktrace-finds-chinese-nexus-intrusions-reveal-dual-mode-tactics-targeting-critical-infrastructure-at-scale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:36:58.000Z</news:publication_date>
      <news:title>Darktrace finds Chinese-nexus intrusions reveal dual-mode tactics targeting critical infrastructure at scale</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/hackers-threaten-to-leak-german-political-party-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:29:00.000Z</news:publication_date>
      <news:title>Hackers threaten to leak data after cyberattack on German party Die Linke</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/sans-2026-report-flags-cybersecurity-skills-crisis-putting-critical-infrastructure-and-ot-sectors-at-measurable-breach-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:24:00.000Z</news:publication_date>
      <news:title>SANS 2026 report flags cybersecurity skills crisis, putting critical infrastructure and OT sectors at measurable breach risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdxbxj/closing_the_kernel_backport_gap_automated_cve/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:22:16.000Z</news:publication_date>
      <news:title>Closing the Kernel Backport Gap: Automated CVE Detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdxafb/traffic_violation_scams_switch_to_qr_codes_in_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:20:20.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdwya8/axios_maintainers_post_mortem_confirms_social/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:04:48.000Z</news:publication_date>
      <news:title>Axios maintainer’s post mortem confirms social engineering by UNC1069</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds One Known Exploited Vulnerability to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/how-litellm-turned-developer-machines.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:45:00.000Z</news:publication_date>
      <news:title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdwgyh/new_rowhammer_attacks_give_complete_control_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:42:40.000Z</news:publication_date>
      <news:title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/guardarian-users-targeted-with-malicious-strapi-npm-packages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:40:56.000Z</news:publication_date>
      <news:title>Guardarian Users Targeted With Malicious Strapi NPM Packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:03:58.000Z</news:publication_date>
      <news:title>Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/north-korean-hackers-target-high-profile-node-js-maintainers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:02:36.000Z</news:publication_date>
      <news:title>North Korean Hackers Target High-Profile Node.js Maintainers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdvk2q/controls_shape_attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:56:35.000Z</news:publication_date>
      <news:title>Controls Shape Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdv8dm/cracking_a_malvertising_dga_from_the_device_side/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:39:02.000Z</news:publication_date>
      <news:title>Cracking a Malvertising DGA From the Device Side</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/qilin-and-warlock-ransomware-use.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:07:00.000Z</news:publication_date>
      <news:title>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fortinet-rushes-emergency-fixes-for-exploited-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:37:28.000Z</news:publication_date>
      <news:title>Fortinet Rushes Emergency Fixes for Exploited Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdtqh2/found_a_forgotten_public_s3_bucket_with_40k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:11:19.000Z</news:publication_date>
      <news:title>Found a "forgotten" public S3 bucket with 40k+ customer KYC docs at my new gig</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdtqh2/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:11:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32870</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:50:27.000Z</news:publication_date>
      <news:title>How often are redirects used in phishing in 2026&amp;#x3f;, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdt12c/gave_everything_to_a_technical_assessment_only_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:27:33.000Z</news:publication_date>
      <news:title>Gave everything to a technical assessment only to get rejected because the position was already filled - how do you handle this?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sds2bv/is_oneman_ciso_role_worth_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:28:21.000Z</news:publication_date>
      <news:title>Is one-man CISO role worth it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-march-30-april-5-2</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:01:00.000Z</news:publication_date>
      <news:title>A week in security (March 30 &amp;#8211; April 5)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:59:00.000Z</news:publication_date>
      <news:title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrh2y/htb_media_machine_walkthrough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:53:13.000Z</news:publication_date>
      <news:title>HTB Media Machine Walkthrough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrc73/interesting_leakixnet_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:44:51.000Z</news:publication_date>
      <news:title>Interesting leakix.net scanning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdr9ip/built_a_tool_to_find_which_of_your_gcp_api_keys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:40:26.000Z</news:publication_date>
      <news:title>Built a tool to find which of your GCP API keys now have Gemini access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/residential-proxy-attack-traffic-ip-reputation-enterprise-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:30:05.000Z</news:publication_date>
      <news:title>Residential proxies make a mockery of IP-based defenses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/product-showcase-proton-authenticator-encrypted-open-source-2fa-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:00:39.000Z</news:publication_date>
      <news:title>Product showcase: Proton Authenticator is an end-to-end encrypted, open source 2FA app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/how-crowdstrike-accelerates-exposure-evaluation-against-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:00:00.000Z</news:publication_date>
      <news:title>How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp8wh/고배당_특정_숫자_베팅에_쏠리는_데이터_패턴의_기술적_해석/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:46:00.000Z</news:publication_date>
      <news:title>고배당 특정 숫자 베팅에 쏠리는 데이터 패턴의 기술적 해석</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp2zz/hidomgdetect_linux_driver_in_development_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:36:55.000Z</news:publication_date>
      <news:title>hid-omg-detect: Linux driver in development to detect malicious HID devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/enterprise-wireless-networks-security-exposure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:30:10.000Z</news:publication_date>
      <news:title>IT talent looks the other way as wireless security incidents pile up</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/rh-isac-enterprise-security-spending-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:00:36.000Z</news:publication_date>
      <news:title>CISOs grapple with AI demands within flat budgets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdnuib/how_md5_hashing_works_and_does_it_actually_detect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:33:40.000Z</news:publication_date>
      <news:title>How MD5 hashing works and does it actually detect file changes. and can you still trust it today?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdmipk/teampcp_used_trivy_to_breach_cisco_the_eu/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:30:33.000Z</news:publication_date>
      <news:title>TeamPCP used Trivy to breach Cisco, the EU Commission, and 1,000+ orgs—IOCs inside, April 3 deadline just passed with no statement from Cisco</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:07:17.000Z</news:publication_date>
      <news:title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32868</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdlisb/the_attack_with_no_attacker_domain_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T01:45:04.000Z</news:publication_date>
      <news:title>The Attack With No Attacker Domain: Microsoft Entra B2B Guest Invitation Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdjzyp/bi_developer_here_should_i_pivot_to_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:35:55.000Z</news:publication_date>
      <news:title>BI Developer here… should I pivot to AI, cybersecurity, or something else?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdj7y0/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:30.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52491</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Grafana 11.6.0 - SSRF</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52490</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Zhiyuan OA - arbitrary file upload leading</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52489</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] WBCE CMS 1.6.4 - Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52488</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52487</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] WordPress  Madara - Local File Inclusion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52496</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] is-localhost-ip 2.0.0 - SSRF</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52495</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52494</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] Windows Kernel - Elevation of Privilege</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52493</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52492</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] ASP.net  8.0.10 - Bypass</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdi3vt/why_isnt_pgp_used_more_often_with_email_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T23:11:31.000Z</news:publication_date>
      <news:title>Why isn't PGP used more often with email security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/podcast/2026/04/killer-robots-are-here-now-what-lock-and-code-s07e07</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T23:10:20.000Z</news:publication_date>
      <news:title>Killer robots are here. Now what? (Lock and Code S07E07)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdh7fr/i_have_16_hours_of_mostly_free_time_whats_a_skill/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T22:33:05.000Z</news:publication_date>
      <news:title>I have 16 hours of mostly free time. What’s a skill I should learn? Mostly for fun</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdgj6n/cyber_security_freelancers_smaller_nontech/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T22:04:38.000Z</news:publication_date>
      <news:title>Cyber Security Freelancers - smaller non-tech companies?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdg874/anyone_have_blackwin_v4_iso_i_wanna_try_it_out/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:52:02.000Z</news:publication_date>
      <news:title>Anyone have blackwin v4 iso I wanna try it out but the pads is under maintenance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdg5g1/i_have_to_choose_my_ug_program_i_want_to_choose/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:48:55.000Z</news:publication_date>
      <news:title>I have to choose my ug program i want to choose cyb sec over BS CS cz thats too general but i am hesitant that AI might replace it too?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdfgwo/what_sources_are_you_following_for_ai_agentic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:21:03.000Z</news:publication_date>
      <news:title>What sources are you following for AI / Agentic security news, writeups, etc?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdfddc/tools_at_work/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:17:02.000Z</news:publication_date>
      <news:title>Tools at work</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdf8mw/any_good_newslettersblogs_on_infosec/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:11:44.000Z</news:publication_date>
      <news:title>Any good newsletters/blogs on infosec?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdd6l8/cysa_renewal_question/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:49:57.000Z</news:publication_date>
      <news:title>CySA+ renewal question</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:44:10.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdck5c/fake_claude_code_source_downloads_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:25:03.000Z</news:publication_date>
      <news:title>Fake Claude Code source downloads actually delivered malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdcamw/for_my_security_compliance_folks_and_individuals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:14:34.000Z</news:publication_date>
      <news:title>For my security compliance folks and individuals creating response documentation, what tools or templates do you use? Im trying "responseprep" at the moment. It makes the initial work so much easier for final edits. With all the new shiny tools out there, who's using what or are you hand writing?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:45:17.000Z</news:publication_date>
      <news:title>New FortiClient EMS flaw exploited in attacks, emergency patch released</news:title>
    </news:news>
  </url>
</urlset>