<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skgnii/why_strykers_outage_is_a_disaster_recovery_wakeup/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:51:55.000Z</news:publication_date>
      <news:title>Why Stryker's Outage Is a Disaster Recovery Wake-Up Call</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/phishing-takedown-indonesia-fbi</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:45:00.000Z</news:publication_date>
      <news:title>FBI, Indonesia take down W3LL phishing tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1skfumg/coinbase_agentkit_prompt_injection_wallet_drain/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:24:36.000Z</news:publication_date>
      <news:title>Coinbase AgentKit Prompt Injection: Wallet Drain, Infinite Approvals, and Agent-Level RCE (validated by Coinbase, on-chain PoC)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skftx8/i_tested_corpus_poisoning_and_prompt_injection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:23:55.000Z</news:publication_date>
      <news:title>I tested corpus poisoning and prompt injection against a RAG-based SOC assistant - empirical results from 15 benchmark scenarios.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skfevh/basicfit_discloses_that_the_personal_data_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:09:27.000Z</news:publication_date>
      <news:title>Basic-Fit discloses that the personal data of around 1 million members of the Netherlands, Belgium, France, Spain, Germany and Luxembourg have been breached</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/meta-ray-ban-oakley-smart-glasses-no-face-recognition-civil-society/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:01:30.000Z</news:publication_date>
      <news:title>Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/product-tech/2026/04/13/anatomy-autonomous-ai-agent-risk-qualys-etm-openclaw</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:44:43.000Z</news:publication_date>
      <news:title>Anatomy of an Autonomous AI Agent Risk: How Qualys ETM Connects the Dots on OpenClaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1skeoem/clearframe_an_opensource_ai_agent_protocol_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:44:09.000Z</news:publication_date>
      <news:title>ClearFrame – an open-source AI agent protocol with auditability and goal monitoring</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1skelmn/stealthy_rce_on_hardened_linux_noexec_userland/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:41:28.000Z</news:publication_date>
      <news:title>Stealthy RCE on Hardened Linux: noexec + Userland Execution PoC</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1skek0b/psa_notepad_was_secretly_compromised_for_months/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:39:56.000Z</news:publication_date>
      <news:title>PSA: Notepad++ was secretly compromised for months by what researchers believe are Chinese state sponsored hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:37:05.000Z</news:publication_date>
      <news:title>Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skeezj/technical_expertise_or_soft_skills/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:35:10.000Z</news:publication_date>
      <news:title>technical expertise or soft skills</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skdy7h/most_compliance_problems_are_design_problems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:19:02.000Z</news:publication_date>
      <news:title>Most compliance problems are design problems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skdx12/gta_vi_developers_hacked_rockstar_confirms_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:17:53.000Z</news:publication_date>
      <news:title>GTA VI Developers Hacked - Rockstar Confirms Data Leak</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cloud-security/apt41-zero-detection-backdoor-harvest-cloud-credentials</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:08:12.000Z</news:publication_date>
      <news:title>APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/mailbox-rule-abuse-stealthy-post/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:00:00.000Z</news:publication_date>
      <news:title>Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/product-tech/2026/04/13/deep-scan-expanding-vulnerability-detection-beyond-traditional-boundaries</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:00:00.000Z</news:publication_date>
      <news:title>Deep Scan: Expanding Vulnerability Detection Beyond Traditional Boundaries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skd946/sources_arent_safe_when_surveillance_is_for_sale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:55:44.000Z</news:publication_date>
      <news:title>Sources aren’t safe when surveillance is for sale</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skd7ca/which_cybersecurity_conferencesjournals_are/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:54:03.000Z</news:publication_date>
      <news:title>Which cybersecurity conferences/journals are reputable?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/fbi-and-indonesian-police-dismantle.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:46:00.000Z</news:publication_date>
      <news:title>FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skcxy4/why_do_we_need_both_symmetric_and_asymmetric/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:45:00.000Z</news:publication_date>
      <news:title>Why do we need both symmetric and asymmetric encryption?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skcruq/a_website_pretending_to_be_a_legitimate_claude/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:39:08.000Z</news:publication_date>
      <news:title>A website pretending to be a legitimate Claude domain was caught serving a remote access trojan to its visitors</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/mirax-trojan-devices-proxy-nodes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:30:00.000Z</news:publication_date>
      <news:title>Mirax Android Trojan Turns Devices Into Residential Proxy Nodes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/booking-com-says-hackers-accessed-user-information/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:25:07.000Z</news:publication_date>
      <news:title>Booking.com Says Hackers Accessed User Information</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/rockstar-hackers-cyberattack-cloud</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:15:00.000Z</news:publication_date>
      <news:title>Hackers claim breach of Rockstar Games via cloud analytics platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:05:15.000Z</news:publication_date>
      <news:title>The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/browsergate-claims-of-linkedin-spying-clash-with-security-research-findings/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:00:00.000Z</news:publication_date>
      <news:title>BrowserGate: Claims of LinkedIn ‘Spying’ Clash With Security Research Findings</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skb9xt/esp8266_hacking_device/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:44:53.000Z</news:publication_date>
      <news:title>ESP8266 HACKING DEVICE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1skazzv/cve202622666_dolibarr_2300_dol_eval_whitelist/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:34:19.000Z</news:publication_date>
      <news:title>CVE-2026-22666: Dolibarr 23.0.0 dol_eval() whitelist bypass -&gt; RCE (full write-up + PoC)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skawmu/whats_something_about_pentesting_that_isnt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:30:49.000Z</news:publication_date>
      <news:title>What’s something about pentesting that isn’t obvious until you go through it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/cpuid-download-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:07:07.000Z</news:publication_date>
      <news:title>Hackers hijacked CPUID downloads, served STX RAT to victims</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skaawh/gym_giant_basicfit_breached_with_at_least_1m/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:06:53.000Z</news:publication_date>
      <news:title>Gym giant Basic-Fit breached with at least 1M affected</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32892</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:02:50.000Z</news:publication_date>
      <news:title>Scans for EncystPHP Webshell, (Mon, Apr 13th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:01:00.000Z</news:publication_date>
      <news:title>⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ska1y3/a_second_agent_that_proves_the_first_one_wrong/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:57:38.000Z</news:publication_date>
      <news:title>A Second Agent That Proves the First One Wrong</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ska1mx/how_do_nonsecurity_specialists_actually_stay/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:57:18.000Z</news:publication_date>
      <news:title>How do non-security specialists actually stay informed in smaller businesses?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk9v08/where_do_current_aiagent_security_evals_break/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:49:43.000Z</news:publication_date>
      <news:title>Where do current AI-agent security evals break down in real enterprise environments?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/crypto-scam-crackdown-12-million-frozen/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:42:38.000Z</news:publication_date>
      <news:title>$12 million frozen, 20,000 victims identified in crypto scam crackdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/openai-impacted-by-north-korea-linked-axios-supply-chain-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:34:06.000Z</news:publication_date>
      <news:title>OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk9dqj/algum_grupo_bom_de_cibersegurança_no_discord/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:29:34.000Z</news:publication_date>
      <news:title>Algum grupo bom de cibersegurança no Discord fazer networking?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk96tq/yarax_now_runs_in_the_browser_official_playground/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:21:13.000Z</news:publication_date>
      <news:title>YARA-X now runs in the browser - official Playground</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk8ysd/best_antiphishing_settings_in_microsoft_defender/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:11:29.000Z</news:publication_date>
      <news:title>Best anti-phishing settings in Microsoft Defender for Office 365?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/rockstar-games-data-breach-shinyhunters/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:51:21.000Z</news:publication_date>
      <news:title>Rockstar Games receives “pay or leak” warning after cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk8bf1/are_companies_actually_enabling_claudeai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:42:09.000Z</news:publication_date>
      <news:title>Are companies actually enabling Claude/AI connectors to Slack, Drive, Gmail? How are you controlling access?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/your-mttd-looks-great-your-post-alert.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:41:00.000Z</news:publication_date>
      <news:title>Your MTTD Looks Great. Your Post-Alert Gap Doesn't</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/simply-opening-a-pdf-could-trigger-this-adobe-reader-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:38:36.000Z</news:publication_date>
      <news:title>Simply opening a PDF could trigger this Adobe Reader zero-day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk85sa/i_just_completed_crta_happy_to_share_my/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:34:42.000Z</news:publication_date>
      <news:title>I just completed CRTA – happy to share my experience or help others preparing for it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/international-operation-targets-multimillion-dollar-crypto-theft-schemes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:34:35.000Z</news:publication_date>
      <news:title>International Operation Targets Multimillion-Dollar Crypto Theft Schemes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk83f7/the_persistence_of_analog_rf_links_in_drone_video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:31:30.000Z</news:publication_date>
      <news:title>The persistence of analog RF links in drone video feeds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/ransomware-groups-standardize-double-extortion-and-ai-assisted-targeting-cyfirma-reports/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:24:22.000Z</news:publication_date>
      <news:title>Ransomware groups standardize double extortion and AI-assisted targeting, Cyfirma reports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/threat-landscape/cyber-resilience-moves-beyond-incident-response-as-ai-threats-and-third-party-risks-grow/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:21:29.000Z</news:publication_date>
      <news:title>Cyber resilience moves beyond incident response as AI threats and third-party risks grow</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk7um1/any_thoughtsresearches_on_how_the_cpuid_server/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:19:41.000Z</news:publication_date>
      <news:title>Any thoughts/researches on how the CPUID server was actually breached to serve malware?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk7n3b/github_repo_for_grc_claude_skills/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:09:39.000Z</news:publication_date>
      <news:title>Github repo for GRC Claude Skills</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk7mxa/do_certs_really_matter_at_a_higher_level/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:09:25.000Z</news:publication_date>
      <news:title>Do certs really matter at a higher level?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk7lsz/ransomware_reimagined_why_containment_alone_is_no/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:07:55.000Z</news:publication_date>
      <news:title>Ransomware reimagined: Why containment alone is no longer enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/google-pixel-rust-baseband-modem-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:04:16.000Z</news:publication_date>
      <news:title>Google makes it harder to exploit Pixel 10 modem firmware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/cpuid-hacked-to-serve-trojanized-cpu-z-and-hwmonitor-downloads/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:52:57.000Z</news:publication_date>
      <news:title>CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sk79hw/the_dumbest_hack_of_the_year_exposed_a_very_real/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:50:55.000Z</news:publication_date>
      <news:title>The Dumbest Hack of the Year Exposed a Very Real Problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/fbi-dismantles-phishing-operation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:35:00.000Z</news:publication_date>
      <news:title>FBI Dismantles $20m Phishing Operation W3LL</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk6xc3/one_uppercase_letter_breaks_every_nuxt_app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:33:16.000Z</news:publication_date>
      <news:title>One Uppercase Letter Breaks Every Nuxt App</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/crosswalk-city-hack-cybersecurity-lessons/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:30:00.000Z</news:publication_date>
      <news:title>The Dumbest Hack of the Year Exposed a Very Real Problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/siemens-industrial-automation-datacenter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:20:10.000Z</news:publication_date>
      <news:title>Siemens expands Industrial Automation DataCenter with edge AI and cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/adobe-acrobat-reader-cve-2026-34621-emergency-fix/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:04:51.000Z</news:publication_date>
      <news:title>Adobe issues emergency fix for Acrobat Reader flaw exploited in the wild (CVE-2026-34621)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk6904/the_fbi_recovered_deleted_signal_messages_from_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:56:38.000Z</news:publication_date>
      <news:title>The FBI Recovered Deleted Signal Messages From an iPhone</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fake-claude-website-distributes-plugx-rat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:52:50.000Z</news:publication_date>
      <news:title>Fake Claude Website Distributes PlugX RAT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/dutch-police-veriftools-identity-fraud-arrests/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:39:44.000Z</news:publication_date>
      <news:title>Seized VerifTools servers expose 915,655 fake IDs, 8 arrested</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/associate-cyber-professional-title/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:15:00.000Z</news:publication_date>
      <news:title>UK Cyber Security Council Launches Associate Cyber Security Professional Title</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/north-koreas-apt37-uses-facebook-social.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:15:00.000Z</news:publication_date>
      <news:title>North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk575d/research_detecting_progressive_influence_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:53:45.000Z</news:publication_date>
      <news:title>[Research] Detecting progressive influence in conversation sequences (GL method + demo)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk56tc/building_a_soc_dashboard_for_a_project_what/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:53:12.000Z</news:publication_date>
      <news:title>Building a SOC dashboard for a project. What actually sucks about your current tools?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk54n5/cve20258061_from_userland_to_ring_0/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:49:34.000Z</news:publication_date>
      <news:title>CVE-2025-8061: From User-land to Ring 0</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/gmail-brings-end-to-end-encryption-to-android-and-ios-for-enterprise-users/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:31:33.000Z</news:publication_date>
      <news:title>Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk4j5o/cve20258061_from_userland_to_ring_0/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:13:44.000Z</news:publication_date>
      <news:title>CVE-2025-8061: From User-land to Ring 0</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:00:00.000Z</news:publication_date>
      <news:title>Operation Atlantic Seizes $12m in Crypto Losses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk46ht/일정한_입력_인터벌_패턴_어디까지_자동화로_보시나요/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:53:03.000Z</news:publication_date>
      <news:title>일정한 입력 인터벌 패턴, 어디까지 자동화로 보시나요?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk3yfa/are_there_tools_that_actually_verify_asset/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:39:19.000Z</news:publication_date>
      <news:title>Are there tools that actually verify asset inventory vs just discovering it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-april-6-april-12</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:02:00.000Z</news:publication_date>
      <news:title>A week in security (April 6 &amp;#8211; April 12)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/openai-revokes-macos-app-certificate.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:50:00.000Z</news:publication_date>
      <news:title>OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk30re/tired_of_the_anxiety_of_my_physical_private/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:44:27.000Z</news:publication_date>
      <news:title>Tired of the anxiety of my physical private getting leaked and the innumerable permissions asked by these journalling apps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk2aiq/what_mythos_reveals_about_zero_trusts_scope/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:02:37.000Z</news:publication_date>
      <news:title>What Mythos Reveals About Zero Trust’s Scope Problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/art-manion-tharros-vulnerability-data-quality/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:00:29.000Z</news:publication_date>
      <news:title>Fixing vulnerability data quality requires fixing the architecture first</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sk1x6r/agentic_browser_security_indirect_prompt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:41:44.000Z</news:publication_date>
      <news:title>Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/zeroid-open-source-identity-platform-autonomous-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:30:40.000Z</news:publication_date>
      <news:title>ZeroID: Open-source identity platform for autonomous AI agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk1k6i/tool_to_automatically_harden_package_managers_npm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:21:38.000Z</news:publication_date>
      <news:title>Tool to automatically harden package managers (npm, pnpm, uv, yarn, bun) against software supply chain attacks (such as the axios or LiteLLM attacks)?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:00:20.000Z</news:publication_date>
      <news:title>MITRE releases a shared fraud-cyber framework built from real attack data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk0uxb/whatsapp_has_taken_video_of_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:43:58.000Z</news:publication_date>
      <news:title>whatsapp has taken video of me</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/globalsign-certificate-lifecycle-management-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:30:37.000Z</news:publication_date>
      <news:title>Why manual certificate management is running out of time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sk0683/mysterious_link_on_a_financial_sites_login_page/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:08:43.000Z</news:publication_date>
      <news:title>Mysterious link on a financial site's login page</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/archit-lohokare-appviewx-ai-agent-identity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:00:00.000Z</news:publication_date>
      <news:title>Bringing governance and visibility to machine and AI identities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sjxzjx/hello_message_on_iphone_out_of_the_blue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T02:24:23.000Z</news:publication_date>
      <news:title>Hello message on iPhone out of the blue</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32890</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjxffw/irans_forced_nationwide_internet_blackout_becomes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T01:58:22.000Z</news:publication_date>
      <news:title>Iran's forced nationwide internet blackout becomes second-longest on record as it passes 1,000 hours offline — possessing Starlink terminals punishable by death, country using 'military-grade jamming' against service</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjwn5t/comptia_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T01:21:49.000Z</news:publication_date>
      <news:title>CompTIA Security+</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjvufs/is_it_realistic_to_achieve_income_from_bug/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T00:45:19.000Z</news:publication_date>
      <news:title>Is it realistic to achieve income from bug bounties?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjuvsj/made_an_ebpf_syscall_tracer_with_a_live_tui/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T00:01:56.000Z</news:publication_date>
      <news:title>Made an eBPF syscall tracer with a live TUI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjuucq/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T00:00:29.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjuohn/shadownet_v310_time_mastermisconception/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T23:53:08.000Z</news:publication_date>
      <news:title>ShadowNet v3.1.0 - Time Master/Misconception</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/dutch-gym-chain-basic-fit-hit-by-hackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T23:00:00.000Z</news:publication_date>
      <news:title>Hack at Dutch gym chain Basic-Fit exposes customer data in several EU countries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjta5x/i_built_mods_can_we_please_get_a_built_with_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:52:20.000Z</news:publication_date>
      <news:title>"I Built" - Mods, can we please get a "built with A.I" tag and enforce it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjt985/lost_in_a_roadmap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:51:13.000Z</news:publication_date>
      <news:title>Lost in a roadmap</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjsv99/is_tryhackme_premium_worth_in_2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:34:38.000Z</news:publication_date>
      <news:title>Is tryhackme premium worth in 2026?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/13/trisquel-12-0-ecne-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T22:03:13.000Z</news:publication_date>
      <news:title>The fully free Linux OS Trisquel gets a major update with version 12.0 Ecne</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjrjwu/akamai_glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T21:41:29.000Z</news:publication_date>
      <news:title>Akamai #Glasswing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjqtnk/nearly_800_hungarian_government_passwords_found/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T21:13:35.000Z</news:publication_date>
      <news:title>Nearly 800 Hungarian government passwords found exposed online ahead of election</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjqof6/i_built_a_windowsbased_web_security_waf_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T21:08:03.000Z</news:publication_date>
      <news:title>I built a Windows-based web security &amp; WAF testing tool – looking for feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjpe6f/rockstar_games_says_hack_will_have_no_impact/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T20:19:41.000Z</news:publication_date>
      <news:title>Rockstar Games says hack will have ‘no impact’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjpdtc/30_years_old_and_considering_tech_am_i_already/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T20:19:20.000Z</news:publication_date>
      <news:title>30 years old and considering tech… am I already too late?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjp4fm/books_recomendation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T20:09:36.000Z</news:publication_date>
      <news:title>Books recomendation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjouxv/thermaltakecom_hacked_with_a_clickfix_attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T19:59:54.000Z</news:publication_date>
      <news:title>thermaltake.com hacked with a ClickFix attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjnaa5/hackers_claim_control_over_venice_san_marco/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T19:01:42.000Z</news:publication_date>
      <news:title>Hackers claim control over Venice San Marco anti-flood pumps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjn4cc/adobe_fixes_actively_exploited_acrobat_reader/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T18:55:45.000Z</news:publication_date>
      <news:title>Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjmqq0/continue_in_soc_analyst_or_it_support/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T18:42:03.000Z</news:publication_date>
      <news:title>Continue in soc analyst or it support</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjl7gb/scott_bessent_calls_emergency_meeting_with_bank/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T17:44:55.000Z</news:publication_date>
      <news:title>Scott Bessent calls emergency meeting with bank CEOs over AI that could crash the financial system — what is Anthropic’s Mythos and why the panic?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sjkuu2/we_combined_dram_timing_attacks_electrical_grid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T17:31:41.000Z</news:publication_date>
      <news:title>We combined DRAM timing attacks, electrical grid frequency detection, and gyroscope fusion into a single bot detection stack and I think we need to talk about it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjjorv/backdoor_job_in_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:48:45.000Z</news:publication_date>
      <news:title>Backdoor job in IT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjjnk3/are_financial_institutions_underestimating/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:47:27.000Z</news:publication_date>
      <news:title>Are financial institutions underestimating cybersecurity risks?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sjioe3/reverse_engineered_silentsdk_rat_and_c2/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:11:04.000Z</news:publication_date>
      <news:title>Reverse engineered SilentSDK - RAT and C2 infrastructure found on beamers, sold on Amazon/AliExpress/eBay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjim7e/some_sort_of_bruteforcing_for_my_user_password/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:08:48.000Z</news:publication_date>
      <news:title>Some sort of brute-forcing for my user password?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sjim20/reverse_engineered_silentsdk_rat_and_c2/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:08:38.000Z</news:publication_date>
      <news:title>Reverse engineered SilentSDK - RAT and C2 infrastructure found on beamers, sold on Amazon/AliExpress/eBay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sji8lz/darktrace_technical_support_engineer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:54:41.000Z</news:publication_date>
      <news:title>Darktrace Technical Support Engineer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sji791/rate_my_pentesting_ai_still_in_very_early/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:53:13.000Z</news:publication_date>
      <news:title>Rate my pentesting ai (still in very early development)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjhuba/cpuz_hack_question/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:39:09.000Z</news:publication_date>
      <news:title>CPUZ Hack Question</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjhcko/help_refining_my_home_lab_project/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:20:27.000Z</news:publication_date>
      <news:title>Help refining my home lab project</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjgrfq/are_vulnerability_scanners_giving_too_much_noise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:58:08.000Z</news:publication_date>
      <news:title>Are vulnerability scanners giving too much noise or is it just us?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:20:31.000Z</news:publication_date>
      <news:title>Critical Marimo pre-auth RCE flaw now under active exploitation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjepsi/the_sad_decline_of_trenchant_exec_who_had/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:34:42.000Z</news:publication_date>
      <news:title>The Sad Decline of Trenchant Exec Who Had Everything, Before Deciding to Steal and Sell Zero Days to Russian Buyer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sjecf4/paying_google_to_hack_macos_users/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:18:44.000Z</news:publication_date>
      <news:title>Paying Google to Hack macOS Users?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjebzl/paying_google_to_hack_macos_users/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:18:13.000Z</news:publication_date>
      <news:title>Paying Google to Hack macOS Users?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjdsgs/im_aiming_to_become_a_soc_tier_1_analyst/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:54:49.000Z</news:publication_date>
      <news:title>I’m aiming to become a SOC Tier 1 analyst.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjdrdb/estudiar_ciberseguridad_relacionado/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:53:28.000Z</news:publication_date>
      <news:title>Estudiar ciberseguridad (relacionado)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjd6yg/certification_planning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:27:06.000Z</news:publication_date>
      <news:title>Certification Planning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjcy7q/two_different_attackers_poisoned_popular_open/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:15:16.000Z</news:publication_date>
      <news:title>Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjcy5i/advice_on_finding_an_internship/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:15:11.000Z</news:publication_date>
      <news:title>Advice on finding an internship</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjcqvz/ai_safe_cyber_vendors_and_future_of_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:05:44.000Z</news:publication_date>
      <news:title>AI Safe Cyber Vendors and Future of Cybersecurity Vendors</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjco9h/how_to_create_a_pgp_key_tordaily/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:02:25.000Z</news:publication_date>
      <news:title>How to create a pgp key - TorDaily</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjc8kt/zerodays_are_expensive_why_spend_them_when_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:40:42.000Z</news:publication_date>
      <news:title>Zero-days are expensive. Why spend them when the front door is already open.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sjbjgp/how_do_hackers_actually_find_vulnerabilities_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:03:37.000Z</news:publication_date>
      <news:title>How do hackers actually find vulnerabilities in real applications?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sja9u1/is_a_realtime_aipowered_security_system_a_viable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T09:51:21.000Z</news:publication_date>
      <news:title>Is a real-time AI-powered security system a viable SaaS idea?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj8vgs/use_of_ai_in_soc_analyst_roles/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T08:28:07.000Z</news:publication_date>
      <news:title>Use of AI in SOC Analyst Roles</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/12/week-in-review-windows-zero-day-exploit-leaked-patch-tuesday-forecast/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T08:00:55.000Z</news:publication_date>
      <news:title>Week in review: Windows zero-day exploit leaked, Patch Tuesday forecast</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj8cb7/unknown_devices_connecting_to_our_iotonly_network/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:57:17.000Z</news:publication_date>
      <news:title>Unknown devices connecting to our IoT-only network — MAC address mismatch, need help investigating</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj8a2w/tiktok_app_traffic_protocols/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:53:51.000Z</news:publication_date>
      <news:title>Tiktok app traffic protocols</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/adobe-patches-reader-zero-day-exploited-for-months/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:45:26.000Z</news:publication_date>
      <news:title>Adobe Patches Reader Zero-Day Exploited for Months</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj81ve/cpuz_and_hwmonitor_watering_hole_infection_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T07:40:30.000Z</news:publication_date>
      <news:title>CPU-Z and HWMonitor watering hole infection – a copy-pasted attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj6v36/faang_security_engineer_getting_ready_for_layoffs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T06:33:31.000Z</news:publication_date>
      <news:title>FAANG security engineer getting ready for layoffs. For senior folks in this sub, how is my studying plan?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:54:00.000Z</news:publication_date>
      <news:title>CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/industrial-systems-face-structural-gap-as-quantum-risks-drive-urgency-for-crypto-agility-and-post-quantum-readiness/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:33:31.000Z</news:publication_date>
      <news:title>Industrial systems face structural gap as quantum risks drive urgency for crypto-agility and post-quantum readiness</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj5cqw/built_a_system_that_generates_signed_verification/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:10:12.000Z</news:publication_date>
      <news:title>Built a system that generates signed verification receipts for SBOMs — looking for feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sj5bp2/cheap_chinese_fake_iphone/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T05:08:37.000Z</news:publication_date>
      <news:title>cheap chinese fake iphone.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T04:25:00.000Z</news:publication_date>
      <news:title>Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sj2ypx/information_security_learning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T03:08:28.000Z</news:publication_date>
      <news:title>Information security learning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siya8y/defeating_dpi_and_behavioral_heuristics_protocol/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T23:27:24.000Z</news:publication_date>
      <news:title>Defeating DPI and Behavioral Heuristics: Protocol Mimicry, W^X Injection, and DPCM-RLE Compression in Pure x64 Assembly</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sixcqt/private_repositories_questions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T22:46:50.000Z</news:publication_date>
      <news:title>Private repositories - Questions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1six9zn/cto_at_ncsc_summary_week_ending_april_12th/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T22:43:26.000Z</news:publication_date>
      <news:title>CTO at NCSC Summary: week ending April 12th</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siwx3o/need_urgent_advice_being_approached_by_suspicious/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T22:28:14.000Z</news:publication_date>
      <news:title>need urgent advice - being approached by suspicious individuals regarding my researches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1siw1gg/ai_screen_readers_as_an_emerging_attack_surface/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T21:51:22.000Z</news:publication_date>
      <news:title>AI screen readers as an emerging attack surface for sensitive web form inputs — Microsoft Copilot Vision reads page content in real time including what users type</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sivxng/netwatch_v0110_connection_list_filtering_paging/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T21:46:50.000Z</news:publication_date>
      <news:title>netwatch v0.11.0 — connection list filtering, paging, and Ollama Cloud for AI insights</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siu2y1/does_anyone_know_the_code_to_this_website_page/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:31:30.000Z</news:publication_date>
      <news:title>Does anyone know the code to this website page????</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sitxw0/zero_data_retention_is_not_optional_anymore/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:25:57.000Z</news:publication_date>
      <news:title>Zero Data Retention is not optional anymore</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sittc8/how_do_you_reliably_handleclose_popups_using/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:20:55.000Z</news:publication_date>
      <news:title>How do you reliably handle/close popups using Selenium in Python?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sitset/prioritising_large_nmap_scans_using_service/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:19:58.000Z</news:publication_date>
      <news:title>Prioritising large Nmap scans using service rarity and version grouping</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sitd4c/over_20000_crypto_fraud_victims_identified_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:03:30.000Z</news:publication_date>
      <news:title>Over 20,000 crypto fraud victims identified in international crackdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sit7ox/uk_oil_and_gas_company_zephyr_energy_loses_700k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T19:57:47.000Z</news:publication_date>
      <news:title>UK oil and gas company Zephyr Energy loses £700K to contractor payment fraud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1siqstx/forensic_analysis_movie_streaming_website/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T18:26:33.000Z</news:publication_date>
      <news:title>Forensic Analysis Movie Streaming Website</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sippw8/devops_appreciation_thread/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T17:46:27.000Z</news:publication_date>
      <news:title>DevOps Appreciation Thread</news:title>
    </news:news>
  </url>
</urlset>