<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srjtur/why_forensic_readiness_is_emerging_as_a_real/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:36:08.000Z</news:publication_date>
      <news:title>Why forensic readiness is emerging as a real enterprise security market</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srjm74/hi_all_i_am_currently_in_a_grc_role_at_one_of_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:24:54.000Z</news:publication_date>
      <news:title>Hi all, I am currently in a GRC role at one of the top universities in EU. I in this post want some guidance on how do I transition into red teaming roles. Any guidance on this will be extremely helpful.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/vect-formalizes-breachforums-and-teampcp-alliance-to-push-model-for-industrialized-ransomware-scale-raas-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:18:47.000Z</news:publication_date>
      <news:title>Vect formalizes BreachForums and TeamPCP alliance to push model for industrialized ransomware, scale RaaS operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/darktrace-identifies-zionsiphon-malware-engineered-for-ot-disruption-in-israeli-water-sector-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:15:48.000Z</news:publication_date>
      <news:title>Darktrace identifies ZionSiphon malware engineered for OT disruption in Israeli water sector environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/mobile/2026/04/android-17-ends-all-or-nothing-access-to-your-contacts</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:12:27.000Z</news:publication_date>
      <news:title>Android 17 ends all-or-nothing access to your contacts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:12:21.000Z</news:publication_date>
      <news:title>Former ransomware negotiator pleads guilty to BlackCat attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/cisa/cisa-warns-organizations-of-supply-chain-compromise-in-axios-npm-package-delivering-remote-access-trojan/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:11:54.000Z</news:publication_date>
      <news:title>CISA warns organizations of supply chain compromise in Axios npm package delivering remote access trojan</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/290-million-kelp-dao-crypto-heist-blamed-on-north-korea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:02:09.000Z</news:publication_date>
      <news:title>$290 Million Kelp DAO Crypto Heist Blamed on North Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/anthropic-mythos-vulnerability-discovery-op-ed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:00:00.000Z</news:publication_date>
      <news:title>Mythos can find the vulnerability. It can’t tell you what to do about it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/they-built-privacy-tool-grapheneos-now-sworn-enemies/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:00:00.000Z</news:publication_date>
      <news:title>They Built a Legendary Privacy Tool. Now They’re Sworn Enemies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srj393/ai_prompt_injection_the_new_security_nightmare/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:55:55.000Z</news:publication_date>
      <news:title>AI Prompt Injection: The New Security Nightmare</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srj1qm/full_day_technical_test_for_a_penetration_tester/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:53:28.000Z</news:publication_date>
      <news:title>Full day technical test for a penetration tester role - is that normal?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sriofz/first_cyber_sec_analyst_job_interview_with_asda_uk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:32.000Z</news:publication_date>
      <news:title>First cyber sec analyst job interview with Asda (UK).</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/vercel-cyber-incident-threat-actor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:10:00.000Z</news:publication_date>
      <news:title>Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/ngate-android-malware-uses-handypay-nfc-app-to-steal-card-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:00:00.000Z</news:publication_date>
      <news:title>NGate Android malware uses HandyPay NFC app to steal card data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/north-korean-blamed-290m-kelpdao/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T08:30:00.000Z</news:publication_date>
      <news:title>North Korean Blamed for $290m KelpDAO Crypto Heist</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srgsts/in_my_recent_projects_i_dont_rely_on_a_single_llm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:38:37.000Z</news:publication_date>
      <news:title>In my recent projects, I don’t rely on a single LLM for security analysis anymore.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32910</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:14:56.000Z</news:publication_date>
      <news:title>A .WAV With A Payload, (Tue, Apr 21st)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srfst6/i_need_url_of_discord_server_to_learn_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:40:24.000Z</news:publication_date>
      <news:title>I need url of discord server to learn cyber security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:23:00.000Z</news:publication_date>
      <news:title>CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sreu19/vercel_got_exploited_again/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:46:31.000Z</news:publication_date>
      <news:title>Vercel got exploited AGAIN</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sreoqm/how_important_is_reconnaissance_in_bug_bounties/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:38:35.000Z</news:publication_date>
      <news:title>How important is reconnaissance in bug bounties or actual hacking? When you do subdomain enumeration, etc., you only feel like you're getting further away from the actual target.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sreolc/command_execution_via_draganddrop_in_terminal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:38:22.000Z</news:publication_date>
      <news:title>Command Execution via Drag-and-Drop in Terminal Emulators</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srejs1/vertex_solutions_ai_cyber_security_app_vertex/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:31:12.000Z</news:publication_date>
      <news:title>Vertex Solutions AI Cyber Security App (Vertex Security)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srehuk/did_the_vercel_incident_change_your_threat_model/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:28:26.000Z</news:publication_date>
      <news:title>Did the Vercel incident change your threat model?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdltb/can_anybody_offer_a_more_detailed_tutorial_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:42:28.000Z</news:publication_date>
      <news:title>Can anybody offer a more detailed tutorial on using JtR password cracker</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdk07/being_gaslit_about_email_being_e2ee/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:39:49.000Z</news:publication_date>
      <news:title>Being gaslit about email being E2EE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdhrn/pictures_not_allowed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:36:31.000Z</news:publication_date>
      <news:title>Pictures not allowed?!?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdeu5/could_someone_tell_me_realistically_how_grc_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:32:14.000Z</news:publication_date>
      <news:title>Could someone tell me realistically how GRC is?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/securerouter-encrypted-ai-inference/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:30:41.000Z</news:publication_date>
      <news:title>Researchers build an encrypted routing layer for private AI inference</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdai8/why_selfattestation_is_the_biggest_weakness_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:25:52.000Z</news:publication_date>
      <news:title>Why "Self-Attestation" is the biggest weakness in current AI Governance (and how to fix it with telemetry)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srd29h/i_have_nothing_to_hide_the_last_words_of_every/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:14:16.000Z</news:publication_date>
      <news:title>“I Have Nothing to Hide” — The Last Words of Every Cybercrime Victim: Cybersecurity 101</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srcw4c/dose_it_only_happen_with_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:05:52.000Z</news:publication_date>
      <news:title>Dose it only happen with me ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/cybersecurity-jobs-available-right-now-april-21-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:00:53.000Z</news:publication_date>
      <news:title>Cybersecurity jobs available right now: April 21, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1src7g4/i_made_a_demo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:32:33.000Z</news:publication_date>
      <news:title>I Made a Demo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srbffq/browser_extension_inventory_problem/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:56:10.000Z</news:publication_date>
      <news:title>Browser Extension Inventory problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sram3b/agentbom_0801_open_security_scanner_for_ai_supply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:19:28.000Z</news:publication_date>
      <news:title>Agent-bom 0.80.1: Open security scanner for AI supply chain: agents, MCP, containers, cloud, GPU, and runtime.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32916</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr6hqg/which_is_the_best_to_share_private_files_securely/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:20:45.000Z</news:publication_date>
      <news:title>Which is the best to share private files securely? WeTransfer, anon.li, TresorIt...?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/kelpdao-suffers-290-million-heist-tied-to-lazarus-hackers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:23:52.000Z</news:publication_date>
      <news:title>KelpDAO suffers $290 million heist tied to Lazarus hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr4m02/help_with_my_cve_request_on_vuldb/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:05:06.000Z</news:publication_date>
      <news:title>Help with my CVE request on Vuldb</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr4gnj/serialtoip_converter_flaws_expose_ot_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:59:28.000Z</news:publication_date>
      <news:title>Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/chinas-apple-app-store-infiltrated-by-crypto-stealing-wallet-apps/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:52:54.000Z</news:publication_date>
      <news:title>China's Apple App Store infiltrated by crypto-stealing wallet apps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/google-antigravity-pillar-security-agent-sandbox-escape-remote-code-execution/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:17:31.000Z</news:publication_date>
      <news:title>Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/vercel-employees-ai-tool-access-data-breach</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:31.000Z</news:publication_date>
      <news:title>Vercel Employee's AI Tool Access Led to Data Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ftc-ai-portolio-getting-bigger-take-it-down-voice-cloning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:00:27.000Z</news:publication_date>
      <news:title>The FTC’s AI portfolio is about to get bigger</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/ics-ot-security/serial-ip-devices-thousands-of-bugs</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:00:00.000Z</news:publication_date>
      <news:title>Serial-to-IP Devices Hide Thousands of Old and New Bugs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr2ba5/muffling_faraday_bags_impossible_to_find_anymore/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:41:06.000Z</news:publication_date>
      <news:title>Muffling Faraday Bags impossible to find anymore?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sr28f5/vercels_security_breach_started_with_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:38:20.000Z</news:publication_date>
      <news:title>Vercel's security breach started with malware disguised as Roblox cheats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sr1z4w/analysis_of_the_april_2026_bookingcom_supply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:29:30.000Z</news:publication_date>
      <news:title>Analysis of the April 2026 Booking.com Supply Chain Breach and ClickFix Tactics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/vercel-security-breach-third-party-attack-context-ai-lumma-stealer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:24:40.000Z</news:publication_date>
      <news:title>Vercel’s security breach started with malware disguised as Roblox cheats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:02:37.000Z</news:publication_date>
      <news:title>The Gentlemen ransomware now uses SystemBC for bot-powered attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqzdi6/best_way_to_ramp_up_for_an_isso_role_in_about_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:08:52.000Z</news:publication_date>
      <news:title>Best way to ramp up for an ISSO role in about a month?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:43:49.000Z</news:publication_date>
      <news:title>Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqy077/vulnerability_summary_for_the_week_of_april_13/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:27:36.000Z</news:publication_date>
      <news:title>Vulnerability Summary for the Week of April 13, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/seiko-usa-website-defaced-as-hacker-claims-customer-data-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:22:31.000Z</news:publication_date>
      <news:title>Seiko USA website defaced as hacker claims customer data theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sqxnak/fender_studio_pro_8_crack_from_rutracker/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:16:51.000Z</news:publication_date>
      <news:title>Fender Studio Pro 8 crack from RuTracker installed a miner + RAT on my PC!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqx7df/british_scattered_spider_hacker_pleads_guilty_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:03:12.000Z</news:publication_date>
      <news:title>British Scattered Spider hacker pleads guilty to crypto theft charges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqx3i2/microsoft_teams_increasingly_abused_in_helpdesk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:00:15.000Z</news:publication_date>
      <news:title>Microsoft: Teams increasingly abused in helpdesk impersonation attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqwy84/pefile_maintainer_looking_for_samples_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:55:46.000Z</news:publication_date>
      <news:title>pefile maintainer looking for samples from VirusTotal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqw9w4/how_to_start_on_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:33:40.000Z</news:publication_date>
      <news:title>how to start on cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sqvz0w/vercel_breach_explained_oauth_risk_in_ai_saas/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:23:27.000Z</news:publication_date>
      <news:title>Vercel Breach Explained: OAuth Risk in AI + SaaS Environment</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqvx46/i_looking_out_to_build_a_really_strong_ctf_team/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:21:44.000Z</news:publication_date>
      <news:title>I looking out to build a really strong CTF Team</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:14:00.000Z</news:publication_date>
      <news:title>SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sqvg44/building_a_llm_honeypot_that_monitors_all_65535/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:05:38.000Z</news:publication_date>
      <news:title>Building a LLM honeypot that monitors all 65535 ports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/italian-regulator-fines-postal-service-orgs-15-million-privacy</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:51:00.000Z</news:publication_date>
      <news:title>Italian regulator fines national postal service orgs $15 million for data privacy violations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/crypto-north-korea-theft-kelp</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:45:00.000Z</news:publication_date>
      <news:title>Crypto infrastructure company blames $290 million theft on North Korean hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/bulletins/sb26-110</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:09:44.000Z</news:publication_date>
      <news:title>Vulnerability Summary for the Week of April 13, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/zionsiphon-malware-water/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:00:00.000Z</news:publication_date>
      <news:title>ZionSiphon Malware Targets Water Infrastructure Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/20/making-opportunistic-cyberattacks-harder-by-design/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:00:00.000Z</news:publication_date>
      <news:title>Making opportunistic cyberattacks harder by design</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqt6jw/having_trouble_bypassing_ssl_pinning_for_flutter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:48:09.000Z</news:publication_date>
      <news:title>Having trouble bypassing SSL pinning for flutter app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/serial-to-ip-converter-flaws-expose-ot-and-healthcare-systems-to-hacking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:42:22.000Z</news:publication_date>
      <news:title>Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/20/enterprise-patch-remediation-benchmark-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:30:00.000Z</news:publication_date>
      <news:title>Enterprise Remediation Benchmark: How Does Your Organization Compare?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/microsoft-teams-increasingly-abused-in-helpdesk-impersonation-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:11:24.000Z</news:publication_date>
      <news:title>Microsoft: Teams increasingly abused in helpdesk impersonation attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/formbook-malware-multiple/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:01:00.000Z</news:publication_date>
      <news:title>Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/vercel-breached/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:58:33.000Z</news:publication_date>
      <news:title>Vercel breached via compromised third-party AI tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/elon-musk-avoids-questioning-french-police-x-images-scandal</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:56:00.000Z</news:publication_date>
      <news:title>Elon Musk fails to appear for questioning by French police over sexualized AI images on X</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/whatsapp-leaks-user-metadata</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:33:35.000Z</news:publication_date>
      <news:title>WhatsApp Leaks User Metadata to Attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/podcast/2026/04/big-tech-can-stop-scams-they-just-dont-lock-and-code-s07e08</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:16:12.000Z</news:publication_date>
      <news:title>Big Tech can stop scams. They just don&amp;#8217;t (Lock and Code S07E08)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/france-cyberattack-agency-passports</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:15:00.000Z</news:publication_date>
      <news:title>Cyberattack at French identity document agency may have exposed personal data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqqe6o/secure_application_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:07:13.000Z</news:publication_date>
      <news:title>Secure application data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/the-backup-myth-that-is-putting-businesses-at-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:01:11.000Z</news:publication_date>
      <news:title>The backup myth that is putting businesses at risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/bluesky-blames-app-outage-on-ddos</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:57:00.000Z</news:publication_date>
      <news:title>Bluesky blames app outage on ‘sophisticated’ DDoS attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/mythos-an-ai-tool-too-powerful-for-public-release</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:54:02.000Z</news:publication_date>
      <news:title>Mythos: An AI tool too powerful for public release</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqpw78/data_breach_at_edtech_giant_mcgraw_hill_affects/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:49:04.000Z</news:publication_date>
      <news:title>Data breach at edtech giant McGraw Hill affects 13.5 million accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:41:00.000Z</news:publication_date>
      <news:title>⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge &amp; More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/british-scattered-spider-hacker-pleads-guilty-to-crypto-theft-charges/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:33:42.000Z</news:publication_date>
      <news:title>British Scattered Spider hacker pleads guilty to crypto theft charges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ai-powered-security-operations-axios-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:17:25.000Z</news:publication_date>
      <news:title>Why the Axios attack proves AI is mandatory for supply chain security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqosez/new_signatureless_detection_architecture_signal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:06:32.000Z</news:publication_date>
      <news:title>New Signature-less Detection Architecture: Signal Physics meets Network Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/mirai-variant-dvr-flaw-iot-botnet/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:01:00.000Z</news:publication_date>
      <news:title>Attackers Exploit DVR Command Injection Flaw to Deploy  Mirai-Based Botnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqohzc/mythos_as_hacking_tool_fuels_company_anxiety_over/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:55:03.000Z</news:publication_date>
      <news:title>Mythos as Hacking Tool Fuels Company Anxiety Over Cyber Defense</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqo0v9/anyone_know_if_sonar_did_layoffs_last_week/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:34:44.000Z</news:publication_date>
      <news:title>Anyone know if Sonar did layoffs last week?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/british-scattered-spider-hacker-pleads-guilty-in-the-us/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:21:16.000Z</news:publication_date>
      <news:title>British Scattered Spider Hacker Pleads Guilty in the US</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqnihu/cyber_range_windows_licensing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:12:50.000Z</news:publication_date>
      <news:title>Cyber range Windows licensing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-tests-file-explorer-speed-performance-improvements/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:04:02.000Z</news:publication_date>
      <news:title>Microsoft tests Windows Explorer speed, performance improvements</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/hacker-scattered-spider-guilty-plea</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:00:00.000Z</news:publication_date>
      <news:title>British hacker tied to Scattered Spider campaign pleads guilty in $8M scheme</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/20/supply-chain-compromise-impacts-axios-node-package-manager</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:00:00.000Z</news:publication_date>
      <news:title>​​Supply Chain Compromise Impacts Axios Node Package Manager​</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/20/cisa-adds-eight-known-exploited-vulnerabilities-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds Eight Known Exploited Vulnerabilities to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqmpga/bluetooth_tracker_hidden_in_a_postcard_and_mailed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:36:13.000Z</news:publication_date>
      <news:title>Bluetooth tracker hidden in a postcard and mailed to a warship exposed its location — $5 gadget put a $585 million Dutch ship at risk for 24 hours</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/hackers-abuse-qemu-for-defense-evasion/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:35:29.000Z</news:publication_date>
      <news:title>Hackers Abuse QEMU for Defense Evasion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/risk-management/wef-urges-intelligence-sharing-as-port-cyber-threats-outpace-siloed-defences/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:32:15.000Z</news:publication_date>
      <news:title>WEF urges intelligence sharing as port cyber threats outpace siloed defences</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/why-most-ai-deployments-stall-after-demo.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:30:00.000Z</news:publication_date>
      <news:title>Why Most AI Deployments Stall After the Demo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/medical/hscc-warns-ai-driven-supply-chains-are-outpacing-healthcare-cybersecurity-defenses-and-oversight-models/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:28:47.000Z</news:publication_date>
      <news:title>HSCC warns AI-driven supply chains are outpacing healthcare cybersecurity defenses and oversight models</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/new-ot-isac-advisory-exposes-critical-flaws-across-industrial-control-and-management-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:26:59.000Z</news:publication_date>
      <news:title>New OT-ISAC advisory exposes critical flaws across industrial control and management systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqmcdj/telia_location_data_leaked_through_telecom/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:18:39.000Z</news:publication_date>
      <news:title>Telia: Location data leaked through telecom signaling</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/athr-voice-phishing-ai-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:08:38.000Z</news:publication_date>
      <news:title>AI platform ATHR makes voice phishing a one-person job</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/bluesky-disrupted-by-sophisticated-ddos-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:06:59.000Z</news:publication_date>
      <news:title>Bluesky Disrupted by Sophisticated DDoS Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqm3go/should_i_do_ceh_if_i_can_get_it_for_free_worth_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:06:13.000Z</news:publication_date>
      <news:title>Should I do CEH if I can get it for free? Worth it or just waste of time?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqlxcm/vercel_just_got_hacked_and_it_raises_a_bigger/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:58:09.000Z</news:publication_date>
      <news:title>Vercel just got hacked and it raises a bigger question about AI and security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqlut7/vercel_breached_via_thirdparty_ai_tool/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:54:34.000Z</news:publication_date>
      <news:title>Vercel Breached via Third-Party AI Tool.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqlo3x/anyone_know_what_this_google_url_is_used_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:44:50.000Z</news:publication_date>
      <news:title>Anyone know what this google URL is used for?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://ics-cert.kaspersky.com/events/2026/04/20/kaspersky-ics-cert-experts-present-vulnerability-in-qualcomm-chips-at-black-hat-asia/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:44:30.000Z</news:publication_date>
      <news:title>Kaspersky ICS CERT experts present vulnerability in Qualcomm chips at Black Hat Asia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:42:00.000Z</news:publication_date>
      <news:title>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/senate-extends-surveillance-powers-until-april-30-after-chaotic-votes-in-house/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:32:13.000Z</news:publication_date>
      <news:title>Senate Extends Surveillance Powers Until April 30 After Chaotic Votes in House</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sql8z2/nasa_cfitsio_fuzzing_memory_corruptions_and_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:21:32.000Z</news:publication_date>
      <news:title>Nasa CFITSIO Fuzzing: Memory Corruptions and a Codex-Assisted Pipeline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/ai-software-security-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:00:14.000Z</news:publication_date>
      <news:title>Fracturing Software Security With Frontier AI Models</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/the-weird-twisting-tale-of-how-china-spied-on-alysa-liu-and-her-dad/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:00:00.000Z</news:publication_date>
      <news:title>The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/greynoise-traffic-surge-early-warning-system-network-edge-device-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:00:00.000Z</news:publication_date>
      <news:title>Network ‘background noise’ may predict the next big edge-device vulnerability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/half-of-the-6-million-internet-facing-ftp-servers-lack-encryption/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:41:04.000Z</news:publication_date>
      <news:title>Half of the 6 Million Internet-Facing FTP Servers Lack Encryption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-teams-client-launch-failures-caused-by-service-update/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:40:20.000Z</news:publication_date>
      <news:title>Microsoft pulls service update causing Teams launch failures</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:30:00.000Z</news:publication_date>
      <news:title>NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqk8pu/how_strict_are_cyber_insurance_compliance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:22:59.000Z</news:publication_date>
      <news:title>How strict are cyber insurance / compliance mandates on security awareness training completion?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://ics-cert.kaspersky.com/advisories/2026/04/20/qualcomm-chipsets-series-write-what-where-condition-vulnerability-in-bootrom/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:07:05.000Z</news:publication_date>
      <news:title>Qualcomm chipset series. Write-what-where Condition vulnerability in BootROM</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqjyrz/os_hackearon_desde_que_descargasteis_aplicaciones/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:06:16.000Z</news:publication_date>
      <news:title>¿Os hackearon desde que descargasteis aplicaciones en Artista Pirata?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqjwi1/discord_read_receipts_when_how_often_how_long/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:02:28.000Z</news:publication_date>
      <news:title>Discord Read Receipts: When, How Often, How Long | Paul Koeck</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/crypto-exchange-grinex-western/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:00:00.000Z</news:publication_date>
      <news:title>Crypto Exchange Grinex Blames Western Spies for $13m Theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.welivesecurity.com/en/ransomware/what-ransom-note-doesnt-say/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:00:00.000Z</news:publication_date>
      <news:title>What the ransom note won't say</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-updates-to-fix-windows-server-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:30:56.000Z</news:publication_date>
      <news:title>Microsoft releases emergency updates to fix Windows Server issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/next-js-creator-vercel-hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:30:13.000Z</news:publication_date>
      <news:title>Next.js Creator Vercel Hacked</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqjcxx/persistent_antitheft_solutions_for_realme_note_50/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:29:39.000Z</news:publication_date>
      <news:title>Persistent anti-theft solutions for Realme Note 50 to survive Hard Reset</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/meta-bug-bounty-portswigger-partnership/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:13:30.000Z</news:publication_date>
      <news:title>Meta and PortSwigger drive offensive security further to find what others miss</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/hackers-fail-to-exploit-flaw-in-discontinued-tp-link-routers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:50:01.000Z</news:publication_date>
      <news:title>Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqilli/i_dont_think_privacy_can_be_found_online_any/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:44:06.000Z</news:publication_date>
      <news:title>I don't think privacy can be found "online" any longer.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/researchers-detect-zionsiphon-malware.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:34:00.000Z</news:publication_date>
      <news:title>Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqidka/cloud_development_platform_vercel_confirms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:30:46.000Z</news:publication_date>
      <news:title>Cloud development platform Vercel confirms security breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-april-13-april-19</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:02:00.000Z</news:publication_date>
      <news:title>A week in security (April 13 &amp;#8211; April 19)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/frontier-ai-collapses-exploit-window-how-defenders-must-respond/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T07:00:00.000Z</news:publication_date>
      <news:title>Frontier AI Is Collapsing the Exploit Window. Here&amp;rsquo;s How Defenders Must Respond.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqhs31/any_budgetfriendly_ways_to_get_soc_2_compliance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:56:30.000Z</news:publication_date>
      <news:title>Any budget-friendly ways to get SOC 2 compliance?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqhrno/before_mythos_ruins_vulnerability_research_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:55:47.000Z</news:publication_date>
      <news:title>Before Mythos ruins vulnerability research for everyone. Here is a list all the CVE's I found (with some exploits).</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32914</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:43:22.000Z</news:publication_date>
      <news:title>Handling the CVE Flood With EPSS, (Mon, Apr 20th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/eu-sovereign-cloud-tender-180-million-eu/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T06:43:20.000Z</news:publication_date>
      <news:title>EU pushes for stronger cloud sovereignty, awards €180 million to four providers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqgp72/vercel_ioc_found_in_infostealer_related_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:55:50.000Z</news:publication_date>
      <news:title>Vercel IOC found in Infostealer related to Context employee, alleged source of hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqgg8z/found_an_account_takeover_that_had_been_running/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:42:02.000Z</news:publication_date>
      <news:title>Found an account takeover that had been running for 6 weeks during what should have been a boring license audit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqgfrd/ceh_certificate_renewal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:41:16.000Z</news:publication_date>
      <news:title>CEH certificate renewal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/smokedmeat-ci-cd-pipeline-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:30:15.000Z</news:publication_date>
      <news:title>SmokedMeat: Open-source tool shows what attackers do inside CI/CD pipelines</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/north-korean-job-interview-infiltration-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:00:52.000Z</news:publication_date>
      <news:title>How to spot a North Korean fake in a job interview</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/product-showcase-syncthing-private-file-synchronization-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T04:30:14.000Z</news:publication_date>
      <news:title>Product showcase: Syncthing for secure, private file synchronization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqebn8/advice_on_m365_certification_path_for_entrylevel/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T03:52:07.000Z</news:publication_date>
      <news:title>Advice on M365 Certification Path for Entry-Level Cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/vercel-breach-tied-to-context-ai-hack.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T03:35:00.000Z</news:publication_date>
      <news:title>Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqcufv/incident_response_playbook_for_vercel_compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:41:29.000Z</news:publication_date>
      <news:title>Incident Response Playbook for Vercel compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqc89q/a_17yearold_excel_vulnerability_is_currently/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:13:18.000Z</news:publication_date>
      <news:title>A 17-year-old Excel vulnerability is currently being exploited by threat actors, and it's been flagged by the US' cyber defence agency</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32912</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:00:03.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 20th, 2026 https://isc.sans.edu/podcastdetail/9898, (Mon, Apr 20th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqboj5/vercel_breach_linked_to_infostealer_infection_at/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T01:48:07.000Z</news:publication_date>
      <news:title>Vercel Breach Linked to Infostealer Infection at Context.ai</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqamsa/found_a_new_campaign_almost_the_hard_way/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T01:01:06.000Z</news:publication_date>
      <news:title>Found a new campaign (almost the hard way)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq9y63/a_circular_flow_model_for_agentic_ai_managing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T00:30:38.000Z</news:publication_date>
      <news:title>A Circular Flow Model for Agentic AI: Managing Recursive Risk and Operational Instability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq99py/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T00:00:11.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq6h27/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:59:30.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5rhl/qday_आ_रह_ह_indias_1000km_unhackable_network/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:30:45.000Z</news:publication_date>
      <news:title>Q-DAY आ रहा है! India's 1000km Unhackable Network | TruthSutra</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5e30/i_spent_7_days_evading_americas_82_million/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:16:11.000Z</news:publication_date>
      <news:title>I spent 7 days evading America’s 82 MILLION surveillance cameras</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5273/cómo_consigo_trabajo_en_el_sector_ti/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:03:35.000Z</news:publication_date>
      <news:title>¿Cómo consigo trabajo en el sector TI?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq4mzq/se_puede_vivir_económicamente_de_la_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:47:29.000Z</news:publication_date>
      <news:title>Se puede vivir económicamente de la cyber seguridad o haciendo pentesting?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq3tlw/anyone_else_facing_invalid_jwt_token_in_gcp_lab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:16:25.000Z</news:publication_date>
      <news:title>anyone else facing “invalid jwt token” in gcp lab in MCRTA?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq3p6g/i_evaluated_440_security_certifications_and_built/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:11:49.000Z</news:publication_date>
      <news:title>I evaluated 440+ security certifications and built a free comparison tool ... would love your honest feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2u0i/vercel_had_an_internal_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:38:48.000Z</news:publication_date>
      <news:title>Vercel had an Internal Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2e9r/zorvyn_scam_got_exposed_by_xorcist/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:22:04.000Z</news:publication_date>
      <news:title>Zorvyn Scam Got Exposed By XorCist !! 🚨</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2a6i/cloud_development_platform_vercel_confirms_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:17:49.000Z</news:publication_date>
      <news:title>Cloud development platform Vercel confirms breach as hackers claim to be selling stolen data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq1yj0/how_much_engineering_do_security_engineers_do/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:05:45.000Z</news:publication_date>
      <news:title>How much engineering do security engineers do?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq0shj/vercel_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T18:23:05.000Z</news:publication_date>
      <news:title>Vercel breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq0al0/need_help_reversing_an_electron_stealer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T18:05:05.000Z</news:publication_date>
      <news:title>Need help reversing an electron stealer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spzkmr/does_preventing_cwe426_make_a_difference_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T17:39:34.000Z</news:publication_date>
      <news:title>Does preventing CWE-426 make a difference in practice?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T17:32:45.000Z</news:publication_date>
      <news:title>Vercel confirms breach as hackers claim to be selling stolen data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spzcec/vercel_disclosed_a_security_incident_today_april/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T17:31:30.000Z</news:publication_date>
      <news:title>Vercel disclosed a security incident today (April 19, 2026) - what's confirmed, what's reported, what to rotate</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spy3ah/usf_cybersecurity_program/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:44:50.000Z</news:publication_date>
      <news:title>USF Cybersecurity program</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spxak1/sandboxing_emails_from_office_365/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:15:09.000Z</news:publication_date>
      <news:title>Sandboxing Emails from Office 365</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/apple-account-change-alerts-abused-to-send-phishing-emails/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:03:01.000Z</news:publication_date>
      <news:title>Apple account change alerts abused to send phishing emails</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spws5y/built_these_two_systems_for_myself_a_multibackend/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:55:56.000Z</news:publication_date>
      <news:title>Built these two systems for myself - a multi-backend Al engine and a real-time security operations system. Here’s some live data from inside them. Full breakdown coming next.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spwduk/a_typical_pentest_report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:40:44.000Z</news:publication_date>
      <news:title>A typical pentest report</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spvwqs/vercel_says_internal_systems_hit_in_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:22:50.000Z</news:publication_date>
      <news:title>Vercel Says Internal Systems Hit in Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spvqrv/found_and_reported_a_secondorder_sql_injection_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:16:38.000Z</news:publication_date>
      <news:title>Found and reported a Second-Order SQL Injection in mailcow (CVE-2026-40871) – High severity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1spur67/discord_read_receipts_when_how_often_how_long/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T14:39:24.000Z</news:publication_date>
      <news:title>Discord Read Receipts: When, How Often, How Long</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/nist-to-stop-rating-non-priority-flaws-due-to-volume-increase/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T14:17:43.000Z</news:publication_date>
      <news:title>NIST to stop rating non-priority flaws due to volume increase</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sps9rb/need_suggestion/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:57:21.000Z</news:publication_date>
      <news:title>Need suggestion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sps9r2/soc_projects/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:57:20.000Z</news:publication_date>
      <news:title>SOC Projects</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spry0l/practical_adversarial_ml_i_broke_my_own_spam/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:42:32.000Z</news:publication_date>
      <news:title>Practical adversarial ML: I broke my own spam filter, added defenses, broke it again. Notes for anyone deploying ML in adversarial settings</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sprx8y/macbook_and_vms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:41:30.000Z</news:publication_date>
      <news:title>MacBook and VM’s</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spqye6/do_you_find_consistent_use_of_securitytxt_on_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T11:56:01.000Z</news:publication_date>
      <news:title>Do you find consistent use of "security.txt" on web servers?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spqssz/ciso_roles_and_responsibilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T11:48:12.000Z</news:publication_date>
      <news:title>CISO roles and responsibilities</news:title>
    </news:news>
  </url>
</urlset>