<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:44:15.000Z</news:publication_date>
      <news:title>New GPUBreach attack enables system takeover via GPU rowhammer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:12:01.000Z</news:publication_date>
      <news:title>Fortinet customers confront actively exploited zero-day, with a full patch still pending</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/axios-attack-complex-social-engineering-industrialized</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:55:44.000Z</news:publication_date>
      <news:title>Axios Attack Shows Social Complex Engineering Is Industrialized</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/fortinet-emergency-patch-forticlient-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:24:19.000Z</news:publication_date>
      <news:title>Fortinet Issues Emergency Patch for FortiClient Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cyber-fraud-surges-to-17-billion-fbi-ic3</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:24:00.000Z</news:publication_date>
      <news:title>FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sea5v2/is_it_realistic_to_make_consistent_income_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:14:10.000Z</news:publication_date>
      <news:title>Is it realistic to make consistent income from bug bounty programs?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/medusa-ransomware-group-zero-days-microsoft</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:08:00.000Z</news:publication_date>
      <news:title>Medusa ransomware group using zero-days to launch attacks within 24 hours of breach, Microsoft says</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/06/why-every-enterprise-needs-a-risk-operations-center-roc</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:00:57.000Z</news:publication_date>
      <news:title>Why Every Enterprise Needs a Risk Operations Center (ROC)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/big-tech-vows-to-continue-csam-scanning</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:20:00.000Z</news:publication_date>
      <news:title>Big tech vows to continue CSAM scanning in Europe despite expiration of law allowing it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:27.000Z</news:publication_date>
      <news:title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:24.000Z</news:publication_date>
      <news:title>Microsoft fixes Classic Outlook bug causing email delivery issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se8l4f/free_owasp_top_10_for_llm_applications_exercises/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:10.000Z</news:publication_date>
      <news:title>Free OWASP Top 10 for LLM Applications exercises for AI security training. Fully white-labeled for your teaching / learning needs, no strings attached</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se8h0q/responsible_disclosure_is_structurally_dead_not/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:15:31.000Z</news:publication_date>
      <news:title>Responsible disclosure is structurally dead — not dying. Here's the analysis and what replaces it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se7qle/the_fccs_recent_ban_on_new_foreignmade_consumer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:50:08.000Z</news:publication_date>
      <news:title>The FCC’s recent ban on new foreign-made consumer routers may not have an immediate impact for consumers, but one cybersecurity expert says it could have long-term consequences.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/iran-linked-password-spraying-campaign.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:37:00.000Z</news:publication_date>
      <news:title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/german-police-unmask-suspects-linked-revil-gandcrab</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:34:00.000Z</news:publication_date>
      <news:title>German police unmask two suspects linked to REvil ransomware gang</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/us-border-patrol-challenge-coins-nonprofits/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:16:27.000Z</news:publication_date>
      <news:title>Border Patrol Agents Sold Challenge Coins With ‘Charlotte’s Web’ Characters in Riot Gear</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se64xz/education_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:52:35.000Z</news:publication_date>
      <news:title>Education help</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-removes-support-and-recovery-assistant-from-windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:45:57.000Z</news:publication_date>
      <news:title>Microsoft removes Support and Recovery Assistant from Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se5x4i/fuse_powerful_wordlist_generator/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:45:09.000Z</news:publication_date>
      <news:title>Fuse: Powerful wordlist generator</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se5olb/what_does_your_daily_socmdr_work_look_like_3_yoe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:36:58.000Z</news:publication_date>
      <news:title>“What does your daily SOC/MDR work look like? (3 YOE, looking to compare), ready to switch?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/stalkerware-maker-receives-no-jail-time</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:33:00.000Z</news:publication_date>
      <news:title>First stalkerware maker prosecuted since 2014 receives no jail time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:21:23.000Z</news:publication_date>
      <news:title>pcTattleTale stalkerware maker sentence includes fine, supervised release</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se4r27/cyber_secuiry_is_it_high_stress/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:04:09.000Z</news:publication_date>
      <news:title>Cyber secuiry is it high stress?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:56:01.000Z</news:publication_date>
      <news:title>Microsoft links Medusa ransomware affiliate to zero-day attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:35:03.000Z</news:publication_date>
      <news:title>Drift $280M crypto theft linked to 6-month in-person operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:34:17.000Z</news:publication_date>
      <news:title>Inside an AI‑enabled device code phishing campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1se3t0e/10_free_interactive_exercises_for_ai_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:30:05.000Z</news:publication_date>
      <news:title>10 free interactive exercises for AI security training. Fully white-labeled, no strings attached</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:24:00.000Z</news:publication_date>
      <news:title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/singapore-us-warn-of-fortinet-bug-exploited</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:20:00.000Z</news:publication_date>
      <news:title>Singapore, US warn of latest Fortinet bug being exploited in wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-fortinet-flaw-exploited-in-attacks-by-friday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:02:14.000Z</news:publication_date>
      <news:title>CISA orders feds to patch exploited Fortinet EMS flaw by Friday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:00:00.000Z</news:publication_date>
      <news:title>Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se2hdg/how_do_you_think/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:42:36.000Z</news:publication_date>
      <news:title>How do you think ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-deepmind-researchers-map-web-attacks-against-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:32:54.000Z</news:publication_date>
      <news:title>Google DeepMind Researchers Map Web Attacks Against AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se27dc/research_we_scanned_3471_mcp_servers_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:32:41.000Z</news:publication_date>
      <news:title>[RESEARCH] We scanned 3,471 MCP servers for invisible Unicode — GPT-5.4 follows hidden instructions 100% of the time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se263o/do_you_all_know_anybody_that_likes_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:23.000Z</news:publication_date>
      <news:title>Do you all know anybody that likes Microsoft Purview DLP?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/automated-credential-harvesting-campaign-react2shell</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:09.000Z</news:publication_date>
      <news:title>Automated Credential Harvesting Campaign Exploits React2Shell Flaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se21el/web_filtering_test_sites/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:26:40.000Z</news:publication_date>
      <news:title>Web filtering test sites</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se1qs6/using_cloudflares_postquantum_tunnel_to_protect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:16:00.000Z</news:publication_date>
      <news:title>Using Cloudflare’s Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NAS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se1nc3/why_is_the_worlds_web_encryption_100_dependent_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:12:26.000Z</news:publication_date>
      <news:title>Why is the world’s web encryption 100% dependent on a single US-based non-profit?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0z5o/has_anyone_used_cardinalops_tidal_cyber_picus_or/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:48:10.000Z</news:publication_date>
      <news:title>Has anyone used CardinalOps, Tidal Cyber, Picus, or AttackIQ for detection gap analysis and did they actually solve the prioritization problem?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se0u4e/trivy_supply_chain_attack_enabled_european/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:42:57.000Z</news:publication_date>
      <news:title>Trivy supply chain attack enabled European Commission cloud breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0n5h/passive_hid_monitor_that_scores_potentially/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:35:35.000Z</news:publication_date>
      <news:title>Passive HID monitor that scores potentially malicious keyboard-like USB devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0a4t/did_anyone_hear_about_this_linkedin_data_leak/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:21:54.000Z</news:publication_date>
      <news:title>Did anyone hear about this LinkedIn data leak?!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/cve-2026-35616-fortinet-forticlientems-improper-access-control-vulnerability-exploited-in-the</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:21:05.000Z</news:publication_date>
      <news:title>CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/shadow-ai-in-healthcare-is-here-to-stay</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:50.000Z</news:publication_date>
      <news:title>Shadow AI in Healthcare is Here to Stay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/why-simple-breach-monitoring-is-no-longer-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:02:12.000Z</news:publication_date>
      <news:title>Why Simple Breach Monitoring is No Longer Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdzev8/ai_empowered_vulnerability_scanner_tool_for_cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:49:53.000Z</news:publication_date>
      <news:title>AI Empowered Vulnerability scanner tool for cloud based application</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/owasp-genai-security-project-update-matrix</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:49:27.000Z</news:publication_date>
      <news:title>OWASP GenAI Security Project Gets Update, New Tools Matrix</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdylur/how_are_teams_thinking_about_security_for_llm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:17:10.000Z</news:publication_date>
      <news:title>How are teams thinking about security for LLM agents right now?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdykyq/how_do_most_orgs_cope_with_selinux/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:16:08.000Z</news:publication_date>
      <news:title>How do most orgs cope with SELinux?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdye93/cracking_a_malvertising_dga_from_the_device_side/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:08:32.000Z</news:publication_date>
      <news:title>Cracking a Malvertising DGA From the Device Side</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdyd16/weblet_a_security_focused_cms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:07:07.000Z</news:publication_date>
      <news:title>Weblet: A security focused CMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdy6s7/latest_interesting_cybersecurity_news_6th_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:00:07.000Z</news:publication_date>
      <news:title>Latest Interesting Cybersecurity News - 6th of April 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/multi-os-cyberattacks-how-socs-close.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:00:00.000Z</news:publication_date>
      <news:title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/weekly-recap-axios-hack-chrome-0-day.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:46:00.000Z</news:publication_date>
      <news:title>⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/threats-attacks/check-point-tracks-iranian-password-spraying-waves-targeting-government-and-energy-sectors-in-israel-and-uae/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:42:01.000Z</news:publication_date>
      <news:title>Check Point tracks Iranian password-spraying waves targeting government and energy sectors in Israel and UAE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/outage-hits-russian-banking-apps</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:37:00.000Z</news:publication_date>
      <news:title>Major outage hits Russian banking apps, metro payments across regions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/darktrace-finds-chinese-nexus-intrusions-reveal-dual-mode-tactics-targeting-critical-infrastructure-at-scale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:36:58.000Z</news:publication_date>
      <news:title>Darktrace finds Chinese-nexus intrusions reveal dual-mode tactics targeting critical infrastructure at scale</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/hackers-threaten-to-leak-german-political-party-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:29:00.000Z</news:publication_date>
      <news:title>Hackers threaten to leak data after cyberattack on German party Die Linke</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/sans-2026-report-flags-cybersecurity-skills-crisis-putting-critical-infrastructure-and-ot-sectors-at-measurable-breach-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:24:00.000Z</news:publication_date>
      <news:title>SANS 2026 report flags cybersecurity skills crisis, putting critical infrastructure and OT sectors at measurable breach risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdxbxj/closing_the_kernel_backport_gap_automated_cve/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:22:16.000Z</news:publication_date>
      <news:title>Closing the Kernel Backport Gap: Automated CVE Detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdxafb/traffic_violation_scams_switch_to_qr_codes_in_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:20:20.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdwya8/axios_maintainers_post_mortem_confirms_social/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:04:48.000Z</news:publication_date>
      <news:title>Axios maintainer’s post mortem confirms social engineering by UNC1069</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds One Known Exploited Vulnerability to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/how-litellm-turned-developer-machines.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:45:00.000Z</news:publication_date>
      <news:title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdwgyh/new_rowhammer_attacks_give_complete_control_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:42:40.000Z</news:publication_date>
      <news:title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/guardarian-users-targeted-with-malicious-strapi-npm-packages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:40:56.000Z</news:publication_date>
      <news:title>Guardarian Users Targeted With Malicious Strapi NPM Packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/north-korean-hackers-target-high-profile-node-js-maintainers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:02:36.000Z</news:publication_date>
      <news:title>North Korean Hackers Target High-Profile Node.js Maintainers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdvk2q/controls_shape_attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:56:35.000Z</news:publication_date>
      <news:title>Controls Shape Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdv8dm/cracking_a_malvertising_dga_from_the_device_side/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:39:02.000Z</news:publication_date>
      <news:title>Cracking a Malvertising DGA From the Device Side</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/qilin-and-warlock-ransomware-use.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:07:00.000Z</news:publication_date>
      <news:title>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fortinet-rushes-emergency-fixes-for-exploited-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:37:28.000Z</news:publication_date>
      <news:title>Fortinet Rushes Emergency Fixes for Exploited Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdtqh2/found_a_forgotten_public_s3_bucket_with_40k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:11:19.000Z</news:publication_date>
      <news:title>Found a "forgotten" public S3 bucket with 40k+ customer KYC docs at my new gig</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdtqh2/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:11:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32870</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:50:27.000Z</news:publication_date>
      <news:title>How often are redirects used in phishing in 2026&amp;#x3f;, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdt12c/gave_everything_to_a_technical_assessment_only_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:27:33.000Z</news:publication_date>
      <news:title>Gave everything to a technical assessment only to get rejected because the position was already filled - how do you handle this?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sds2bv/is_oneman_ciso_role_worth_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:28:21.000Z</news:publication_date>
      <news:title>Is one-man CISO role worth it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-march-30-april-5-2</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:01:00.000Z</news:publication_date>
      <news:title>A week in security (March 30 &amp;#8211; April 5)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:59:00.000Z</news:publication_date>
      <news:title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrh2y/htb_media_machine_walkthrough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:53:13.000Z</news:publication_date>
      <news:title>HTB Media Machine Walkthrough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrc73/interesting_leakixnet_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:44:51.000Z</news:publication_date>
      <news:title>Interesting leakix.net scanning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdr9ip/built_a_tool_to_find_which_of_your_gcp_api_keys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:40:26.000Z</news:publication_date>
      <news:title>Built a tool to find which of your GCP API keys now have Gemini access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/residential-proxy-attack-traffic-ip-reputation-enterprise-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:30:05.000Z</news:publication_date>
      <news:title>Residential proxies make a mockery of IP-based defenses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/product-showcase-proton-authenticator-encrypted-open-source-2fa-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:00:39.000Z</news:publication_date>
      <news:title>Product showcase: Proton Authenticator is an end-to-end encrypted, open source 2FA app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/how-crowdstrike-accelerates-exposure-evaluation-against-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:00:00.000Z</news:publication_date>
      <news:title>How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp8wh/고배당_특정_숫자_베팅에_쏠리는_데이터_패턴의_기술적_해석/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:46:00.000Z</news:publication_date>
      <news:title>고배당 특정 숫자 베팅에 쏠리는 데이터 패턴의 기술적 해석</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp2zz/hidomgdetect_linux_driver_in_development_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:36:55.000Z</news:publication_date>
      <news:title>hid-omg-detect: Linux driver in development to detect malicious HID devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/enterprise-wireless-networks-security-exposure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:30:10.000Z</news:publication_date>
      <news:title>IT talent looks the other way as wireless security incidents pile up</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/rh-isac-enterprise-security-spending-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:00:36.000Z</news:publication_date>
      <news:title>CISOs grapple with AI demands within flat budgets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdnuib/how_md5_hashing_works_and_does_it_actually_detect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:33:40.000Z</news:publication_date>
      <news:title>How MD5 hashing works and does it actually detect file changes. and can you still trust it today?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdmipk/teampcp_used_trivy_to_breach_cisco_the_eu/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:30:33.000Z</news:publication_date>
      <news:title>TeamPCP used Trivy to breach Cisco, the EU Commission, and 1,000+ orgs—IOCs inside, April 3 deadline just passed with no statement from Cisco</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:07:17.000Z</news:publication_date>
      <news:title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32868</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdlisb/the_attack_with_no_attacker_domain_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T01:45:04.000Z</news:publication_date>
      <news:title>The Attack With No Attacker Domain: Microsoft Entra B2B Guest Invitation Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdjzyp/bi_developer_here_should_i_pivot_to_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:35:55.000Z</news:publication_date>
      <news:title>BI Developer here… should I pivot to AI, cybersecurity, or something else?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdj7y0/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:30.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52491</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Grafana 11.6.0 - SSRF</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52490</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Zhiyuan OA - arbitrary file upload leading</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52489</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] WBCE CMS 1.6.4 - Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52488</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52487</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] WordPress  Madara - Local File Inclusion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52496</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] is-localhost-ip 2.0.0 - SSRF</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52495</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52494</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] Windows Kernel - Elevation of Privilege</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52493</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52492</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] ASP.net  8.0.10 - Bypass</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdi3vt/why_isnt_pgp_used_more_often_with_email_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T23:11:31.000Z</news:publication_date>
      <news:title>Why isn't PGP used more often with email security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/podcast/2026/04/killer-robots-are-here-now-what-lock-and-code-s07e07</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T23:10:20.000Z</news:publication_date>
      <news:title>Killer robots are here. Now what? (Lock and Code S07E07)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdh7fr/i_have_16_hours_of_mostly_free_time_whats_a_skill/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T22:33:05.000Z</news:publication_date>
      <news:title>I have 16 hours of mostly free time. What’s a skill I should learn? Mostly for fun</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdgj6n/cyber_security_freelancers_smaller_nontech/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T22:04:38.000Z</news:publication_date>
      <news:title>Cyber Security Freelancers - smaller non-tech companies?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdg874/anyone_have_blackwin_v4_iso_i_wanna_try_it_out/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:52:02.000Z</news:publication_date>
      <news:title>Anyone have blackwin v4 iso I wanna try it out but the pads is under maintenance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdg5g1/i_have_to_choose_my_ug_program_i_want_to_choose/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:48:55.000Z</news:publication_date>
      <news:title>I have to choose my ug program i want to choose cyb sec over BS CS cz thats too general but i am hesitant that AI might replace it too?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdfgwo/what_sources_are_you_following_for_ai_agentic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:21:03.000Z</news:publication_date>
      <news:title>What sources are you following for AI / Agentic security news, writeups, etc?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdfddc/tools_at_work/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:17:02.000Z</news:publication_date>
      <news:title>Tools at work</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdf8mw/any_good_newslettersblogs_on_infosec/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:11:44.000Z</news:publication_date>
      <news:title>Any good newsletters/blogs on infosec?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdd6l8/cysa_renewal_question/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:49:57.000Z</news:publication_date>
      <news:title>CySA+ renewal question</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:44:10.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdck5c/fake_claude_code_source_downloads_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:25:03.000Z</news:publication_date>
      <news:title>Fake Claude Code source downloads actually delivered malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdcamw/for_my_security_compliance_folks_and_individuals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:14:34.000Z</news:publication_date>
      <news:title>For my security compliance folks and individuals creating response documentation, what tools or templates do you use? Im trying "responseprep" at the moment. It makes the initial work so much easier for final edits. With all the new shiny tools out there, who's using what or are you hand writing?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:45:17.000Z</news:publication_date>
      <news:title>New FortiClient EMS flaw exploited in attacks, emergency patch released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/285-million-drift-hack-traced-to-six.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:25:00.000Z</news:publication_date>
      <news:title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdas5w/linux_70rc7_adding_more_documentation_for_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:15:44.000Z</news:publication_date>
      <news:title>Linux 7.0-rc7 adding more documentation for AI tools to send better security bug reports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sda9ce/a_deeper_look_at_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:55:41.000Z</news:publication_date>
      <news:title>A Deeper Look at RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sda8qp/reverse_engineering_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:54:59.000Z</news:publication_date>
      <news:title>Reverse Engineering RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd9uaa/quieres_aprender_a_cazar_amenazas_en_la_dark_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:39:31.000Z</news:publication_date>
      <news:title>🔥 ¿Quieres aprender a cazar amenazas en la Dark Web? La próxima semana iniciamos el curso de Dark Cyber Threat Intelligence. Te llevamos de lo básico a lo avanzado: investigación en foros oscuros, análisis de malware underground y mucho más. 👉 Obtén un 60% de descuento usando el cupón WILLIE60</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8mc1/cyber_awareness_jeff_3d_figure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:51:57.000Z</news:publication_date>
      <news:title>Cyber Awareness Jeff 3D Figure!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8a5e/is_ai_making_cybersecurity_stronger_or_just/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:38:35.000Z</news:publication_date>
      <news:title>Is AI making cybersecurity stronger or just supercharging hackers too?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd7rtm/anthropic_ran_an_ai_bug_bounty_on_open_source_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:18:37.000Z</news:publication_date>
      <news:title>Anthropic ran an AI bug bounty on open source for a month. It found 500+ zero-days.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd7hzh/gddrhammer_and_geforge_gddr6_gpu_rowhammer_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:08:04.000Z</news:publication_date>
      <news:title>GDDRHammer and GeForge: GDDR6 GPU Rowhammer to root shell (IEEE S&amp;P 2026, exploit code available)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd720i/is_cybersecurity_still_at_its_core_a_human_problem/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:41.000Z</news:publication_date>
      <news:title>Is cybersecurity still, at its core, a human problem?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd71k6/your_email_gateway_has_a_blind_spot_apts_already/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:11.000Z</news:publication_date>
      <news:title>Your Email Gateway Has a Blind Spot. APTs Already Know About It.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd6is7/syd_doing_a_full_exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:29:14.000Z</news:publication_date>
      <news:title>syd doing a full exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-react2shell-in-automated-credential-theft-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T14:17:23.000Z</news:publication_date>
      <news:title>Hackers exploit React2Shell in automated credential theft campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd30zy/certified_network_security_practitioner_cnsp/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T13:00:30.000Z</news:publication_date>
      <news:title>Certified Network Security Practitioner (CNSP) Study Materials?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd2vtq/anyone_interested_in_offline_ctf_event_in_india/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:53:30.000Z</news:publication_date>
      <news:title>Anyone interested in Offline ctf event in india ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1wh3/built_a_tool_to_stop_the_pain_of_manual_evtx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:04:57.000Z</news:publication_date>
      <news:title>Built a tool to stop the pain of manual EVTX triage</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1cgd/can_you_guys_me_suggestions_should_i_do_bca_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:34:43.000Z</news:publication_date>
      <news:title>Can you guys me suggestions, should i do BCA in Cyber Security or something else to get into CS field ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0tzy/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:05:25.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0qbj/deployed_goadlight_on_virtualbox_ubuntu_2404/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:57.000Z</news:publication_date>
      <news:title>Deployed GOAD-Light on VirtualBox (Ubuntu 24.04) - sharing my guide with the real errors I hit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd0q71/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:45.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0nzk/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:56:03.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0667/soc_analyst_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:25:46.000Z</news:publication_date>
      <news:title>SOC Analyst 1</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:00:00.000Z</news:publication_date>
      <news:title>The Hack That Exposed Syria’s Sweeping Security Failures</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scyj3y/feeling_stuck_and_looking_for_honest_advice_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:41:38.000Z</news:publication_date>
      <news:title>feeling stuck and looking for honest advice on whats next</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scy246/about_to_take_ejpt_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:11:26.000Z</news:publication_date>
      <news:title>About to take eJPT. help..</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scxx6w/cyber_crimes_attempt_preperation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:02:50.000Z</news:publication_date>
      <news:title>Cyber crimes &amp; attempt - preperation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:00:49.000Z</news:publication_date>
      <news:title>Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1scx6s9/database_of_malicious_chromeedge_extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:17:46.000Z</news:publication_date>
      <news:title>Database of malicious Chrome/Edge extensions - auto-updated daily</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/rising-breach-costs-and-operational-downtime-redefine-economics-of-ot-cybersecurity-making-it-boardroom-priority/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:55:32.000Z</news:publication_date>
      <news:title>Rising breach costs and operational downtime redefine economics of OT cybersecurity making it boardroom priority</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwnd9/the_visible_key_a_new_way_to_verify_source/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:45:42.000Z</news:publication_date>
      <news:title>The Visible Key — A New Way to Verify Source</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwfwe/are_companies_pushing_the_good_guys_to_go_rogue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:33:08.000Z</news:publication_date>
      <news:title>Are companies pushing the good guys to go rogue?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T05:07:00.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T04:32:00.000Z</news:publication_date>
      <news:title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct8hp/do_you_guys_think_risk_based_alerting_is_dead_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:38:21.000Z</news:publication_date>
      <news:title>Do you guys think Risk Based Alerting is dead in water with the AI landscape.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct022/i_created_a_small_lab_demo_showing_how_responder/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:26:18.000Z</news:publication_date>
      <news:title>I created a small lab demo showing how #Responder can capture NTLM hashes over a local network.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsq79/which_cyber_roles_are_truly_aiproof/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:12:41.000Z</news:publication_date>
      <news:title>Which cyber roles are truly "AI-proof"?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsguv/linkedin_is_spying_on_you_according_to_a_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:00:11.000Z</news:publication_date>
      <news:title>LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scpul1/offering_free_help_with_penetration_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:51:52.000Z</news:publication_date>
      <news:title>Offering Free Help with Penetration Testing Projects (Looking to Build Experience)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scphzz/after_the_mercor_breach_i_built_a_local_secret/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:35:24.000Z</news:publication_date>
      <news:title>After the Mercor breach, I built a local secret scanner for AI-generated code</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scojim/uk_about_to_be_over_employed_have_i_ruined_future/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T23:50:23.000Z</news:publication_date>
      <news:title>UK -About to be over employed - have I ruined future chances at obtaining SC?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scmq9l/website_provider_gave_client_an_spf_include_to_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:29:52.000Z</news:publication_date>
      <news:title>Website provider gave client an SPF include to a domain they did not control, and it was set to +all</news:title>
    </news:news>
  </url>
</urlset>