<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sox2em/microsoft_threat_intelligence_helpdesk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:02:01.000Z</news:publication_date>
      <news:title>Microsoft Threat Intelligence: Helpdesk impersonation via Teams used for cross-tenant access and data exfiltration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sox28t/how_to_pivot_to_cybersecurity_from_being_sysadmin/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:01:50.000Z</news:publication_date>
      <news:title>How to pivot to cybersecurity from being sysadmin / network engineer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sowoo5/good_day_folks_please_refer_a_scrm_program_that/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T12:45:10.000Z</news:publication_date>
      <news:title>Good day folks ! Please refer a SCRM program that can provide a full report with ( Geopolitical, FOCI, cyber security posture, business dev, financial and legal court filings for a vendor ) a solution that can write the report for me NIST-800-161</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sow9z4/why_do_most_realworld_breaches_still_come_down_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T12:26:09.000Z</news:publication_date>
      <news:title>Why do most real-world breaches still come down to simple mistakes?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sovmcj/common_pricetags_vulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T11:54:22.000Z</news:publication_date>
      <news:title>Common pricetags vulnerable</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sou4zz/mad_bugs_even_cat_readmetxt_is_not_safe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:35:38.000Z</news:publication_date>
      <news:title>MAD Bugs: Even "cat readme.txt" is not safe</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-it-takes-2-minutes-to-hack-the-eus-new-age-verification-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:30:00.000Z</news:publication_date>
      <news:title>It Takes 2 Minutes to Hack the EU’s New Age-Verification App</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/tycoon-2fa-loses-phishing-kit-crown-amid-surge-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:30:00.000Z</news:publication_date>
      <news:title>Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sotxf6/the_smart_tv_in_your_living_room_is_a_node_in_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:23:53.000Z</news:publication_date>
      <news:title>The Smart TV in Your Living Room Is a Node in the AI Scraping Economy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sotb5t/tamperedchef_within_gta_vfivem_mods_report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T09:48:33.000Z</news:publication_date>
      <news:title>TamperedChef within GTA V/FiveM mods report - ModsHub / Network Graphics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sosim2/why_is_it_so_hard_to_find_the_right_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T09:01:57.000Z</news:publication_date>
      <news:title>Why is it so hard to find the right cybersecurity course?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sosedv/things_i_wish_i_knew_before_starting_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T08:54:49.000Z</news:publication_date>
      <news:title>Things I wish I knew before starting in cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/1374m-hack-shuts-down-sanctioned-grinex.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:59:00.000Z</news:publication_date>
      <news:title>$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soreu0/is_cybersecurity_still_a_good_career_option_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:55:49.000Z</news:publication_date>
      <news:title>Is cybersecurity still a good career option in 2026?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soqyxw/prototype_adaptive_deception_environment_that/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:30:07.000Z</news:publication_date>
      <news:title>Prototype: Adaptive deception environment that models attacker behaviour and generates dynamic decoys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soqmir/postquantum_cryptography_migration_at_meta/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:10:41.000Z</news:publication_date>
      <news:title>Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soq002/recently_leaked_windows_zerodays_now_exploited_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T06:35:45.000Z</news:publication_date>
      <news:title>Recently leaked Windows zero-days now exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sopwww/payouts_king_ransomware_uses_qemu_vms_to_bypass/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T06:30:57.000Z</news:publication_date>
      <news:title>Payouts King ransomware uses QEMU VMs to bypass endpoint security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T06:01:00.000Z</news:publication_date>
      <news:title>Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sonz62/que_se_necesita_para_entrar_al_mundo_de_la/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T04:48:53.000Z</news:publication_date>
      <news:title>Que se necesita para entrar al mundo de la Ciberseguridad?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sonx43/request_arxiv_endorsement_cscr_primary_csai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T04:45:56.000Z</news:publication_date>
      <news:title>[Request] arXiv Endorsement — cs.CR (primary) + cs.AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sontp4/35f_with_ets_in_2028_realizing_intel_may_not_be/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T04:41:03.000Z</news:publication_date>
      <news:title>35F with ETS in 2028, realizing intel may not be for me. Looking at cyber and could use some honest advice</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soneqx/crowdstrike_mobile_agent/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T04:20:07.000Z</news:publication_date>
      <news:title>CrowdStrike Mobile Agent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1som352/auditing_my_entire_personal_security_stack_what/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T03:15:32.000Z</news:publication_date>
      <news:title>Auditing my entire personal security stack — what are you running in 2026?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1solx2e/whats_your_current_wifi_hardening_playbook/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T03:07:19.000Z</news:publication_date>
      <news:title>What’s your current WiFi hardening playbook?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sokjj3/claude_code_security_permissions_native_sandboxing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T02:01:36.000Z</news:publication_date>
      <news:title>Claude Code Security - Permissions &amp; Native Sandboxing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sojxfx/5_minute_crafts_has_a_cybercrime_problemvideo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T01:32:58.000Z</news:publication_date>
      <news:title>„5 Minute Crafts Has a Cybercrime Problem“-Video deleted</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sogntz/where_can_i_find_a_good_opensource_ddos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T23:07:12.000Z</news:publication_date>
      <news:title>Where can I find a good open-source DDoS protection solution?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1soghe0/ai_uncovered_thousands_of_zeroday_vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T22:59:58.000Z</news:publication_date>
      <news:title>AI uncovered thousands of zero-day vulnerabilities for every major operating system and browser. Including a bug dating back to 1996 in OpenBSD. Patch everything is officially obsolete.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sof5tn/red_teaming_is_no_longer_optional_heres_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T22:05:22.000Z</news:publication_date>
      <news:title>Red Teaming is no longer optional. Here’s a breakdown of the tools securing LLMs against adversarial attacks.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soerdy/bay_area_job_market/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T21:49:27.000Z</news:publication_date>
      <news:title>Bay Area job market?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soeehl/fear_of_being_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T21:35:37.000Z</news:publication_date>
      <news:title>Fear of being hacked</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sodrtj/taking_sans_sec504_next_month_im_feeling_kinda/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T21:12:01.000Z</news:publication_date>
      <news:title>Taking SANS SEC504 next month. I’m feeling kinda scared ngl.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sodjux/claude_opus_wrote_a_chrome_exploit_for_2283/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T21:03:30.000Z</news:publication_date>
      <news:title>Claude Opus wrote a Chrome exploit for 2,283</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1socexa/automated_a_parallel_pentest_workflow_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T20:21:08.000Z</news:publication_date>
      <news:title>Automated a parallel pentest workflow with specialized AI agents. Each runs its domain, Lead correlates findings into one report</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sobv0s/anonymous_credentials_an_illustrated_primer_part_2/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T20:00:48.000Z</news:publication_date>
      <news:title>Anonymous credentials: an illustrated primer (Part 2)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:51:57.000Z</news:publication_date>
      <news:title>How NIST's Cutback of CVE Handling Impacts Cyber Teams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sobccp/first_pentest_contract/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:41:26.000Z</news:publication_date>
      <news:title>First Pentest Contract</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:10:19.000Z</news:publication_date>
      <news:title>Payouts King ransomware uses QEMU VMs to bypass endpoint security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soad14/how_to_test_ai_agent/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:06:04.000Z</news:publication_date>
      <news:title>How to test AI agent?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/tycoon-2fa-hackers-device-code-phishing</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:05:51.000Z</news:publication_date>
      <news:title>Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/white-house-chief-of-staff-to-meet-ith-anthropic-ceo-over-its-new-ai-technology/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:00:00.000Z</news:publication_date>
      <news:title>White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ransomware-nhs-cyberattack-disruption</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T18:45:00.000Z</news:publication_date>
      <news:title>Ransomware attack continues to disrupt healthcare in London nearly two years later</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ddos-hire-europol-doj-crackdown</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T18:30:00.000Z</news:publication_date>
      <news:title>Four arrested in latest ‘PowerOFF’ DDoS-for-hire takedown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so917h/is_it_true_that_google_secopschronicle_siem_does/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T18:18:18.000Z</news:publication_date>
      <news:title>Is it true that Google SecOps/Chronicle SIEM does NOT perform compression on ingested data?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so8ilu/im_the_cto_cofounder_of_chainguard_ask_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:59:52.000Z</news:publication_date>
      <news:title>I’m the CTO &amp; Co-Founder of Chainguard — Ask Me Anything about building and securing the software supply chain in the age of AI!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1so7v0k/givemrecipeexe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:36:20.000Z</news:publication_date>
      <news:title>givemrecipe.exe</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/section-702-fisa-surveillance-law-renewal-congress-debate/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:31:13.000Z</news:publication_date>
      <news:title>The surveillance law Congress can’t quit — and can’t explain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so7obf/three_microsoft_defender_zerodays_actively/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:29:36.000Z</news:publication_date>
      <news:title>Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so7koo/givemrecipeexe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:26:01.000Z</news:publication_date>
      <news:title>givemrecipe.exe</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so78op/exposing_russian_malicious_infrastructure_1250_c2/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:13:55.000Z</news:publication_date>
      <news:title>Exposing Russian Malicious Infrastructure: 1,250+ C2 Servers Mapped Across 165 Providers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so74oj/undefend_windows_defenders_third_zeroday_this/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:09:57.000Z</news:publication_date>
      <news:title>UnDefend: Windows Defender's third zero-day this month blocks all signature updates from a standard user account</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1so72tn/undefend_chaotic_eclipses_third_defender_zeroday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:08:04.000Z</news:publication_date>
      <news:title>UnDefend: Chaotic Eclipse's third Defender zero-day blocks all signature updates from a standard user — no admin required</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so6ub3/shinyhunters_salesforce_campaign_continues_with_7/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T16:59:54.000Z</news:publication_date>
      <news:title>ShinyHunters Salesforce campaign continues with 7 new victims being listed today</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so5kfk/cve202633825_deepdive_the_researcher_commented/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T16:14:37.000Z</news:publication_date>
      <news:title>CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1so5hal/cve202633825_deepdive_the_researcher_commented/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T16:11:29.000Z</news:publication_date>
      <news:title>CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1so4fcw/post_random_pourquoi_pas_les_comptes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T15:33:44.000Z</news:publication_date>
      <news:title>Post random : pourquoi pas les comptes 😭</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so4buc/fractional_gpu_security_every_sharing_mode_mig/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T15:30:15.000Z</news:publication_date>
      <news:title>Fractional GPU Security: Every sharing mode (MIG, MPS, vGPU, container) has been broken in published research. NVIDIA's own documentation confirms the gaps.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/grinex-exchange-blames-western-intelligence-for-137m-crypto-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T15:08:53.000Z</news:publication_date>
      <news:title>Grinex exchange blames "Western intelligence" for $13.7M crypto hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so3jml/6_months_cant_get_hired/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T15:02:19.000Z</news:publication_date>
      <news:title>6 months cant get hired</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/cochat-launches-ai-collaboration-platform-to-combat-shadow-ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T15:00:00.000Z</news:publication_date>
      <news:title>CoChat Launches AI Collaboration Platform to Combat Shadow AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/17/domain-compromise-predictive-shielding-shut-down-lateral-movement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:51:01.000Z</news:publication_date>
      <news:title>Containing a domain compromise: How predictive shielding shut down lateral movement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/every-old-vulnerability-ai-vulnerability</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:47:18.000Z</news:publication_date>
      <news:title>Every Old Vulnerability Is Now an AI Vulnerability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so30qb/brussels_launched_an_age_checking_app_hackers_say/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:43:12.000Z</news:publication_date>
      <news:title>Brussels launched an age checking app. Hackers say it takes 2 minutes to break it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so2ync/linux_71_crypto_code_rework_enables_more/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:41:01.000Z</news:publication_date>
      <news:title>Linux 7.1 crypto code rework enables more optimizations by default</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/this-old-school-scam-is-still-working</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:34:17.000Z</news:publication_date>
      <news:title>This old-school scam is still working</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ukraine-confirms-suspected-apt28-campaign-targeting-prosecutors</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:12:00.000Z</news:publication_date>
      <news:title>Ukraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/republican-mutiny-sinks-trumps-push-to-extend-warrantless-surveillance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:07:02.000Z</news:publication_date>
      <news:title>Republican Mutiny Sinks Trump's Push to Extend Warrantless Surveillance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/inside-an-underground-guide-how-threat-actors-vet-stolen-credit-card-shops/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:01:11.000Z</news:publication_date>
      <news:title>Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so1bhg/congress_should_start_planning_to_limit_worker/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:40:21.000Z</news:publication_date>
      <news:title>Congress Should Start Planning to Limit Worker Surveillance, New Vanderbilt Report Says</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1so15z9/how_private_chats_were_leaked_and_being_stalked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:34:13.000Z</news:publication_date>
      <news:title>How private chats were leaked and being stalked by multiple numbers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:21:00.000Z</news:publication_date>
      <news:title>Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ai-models-rapid-gains/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:20:00.000Z</news:publication_date>
      <news:title>Commercial AI Models Show Rapid Gains in Vulnerability Research</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fisa--trump-congress-extension-surveillance</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:15:00.000Z</news:publication_date>
      <news:title>In defeat for Trump, House extends electronic spying program for just 10 days</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-16-7/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:00:33.000Z</news:publication_date>
      <news:title>The Good, the Bad and the Ugly in Cybersecurity – Week 16</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/coast-guards-cybersecurity-rules-lessons-cisos</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:00:00.000Z</news:publication_date>
      <news:title>Coast Guard's New Cybersecurity Rules Offers Lessons for CISOs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snzyuj/how_did_you_guys_actually_start_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T12:47:03.000Z</news:publication_date>
      <news:title>How did you guys ACTUALLY start in cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/webinar-from-phishing-to-fallout-why-msps-must-rethink-both-security-and-recovery/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T12:20:28.000Z</news:publication_date>
      <news:title>Webinar: From phishing to fallout — Why MSPs must rethink both security and recovery</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/in-other-news-satellite-cybersecurity-act-90k-chrome-flaw-teen-hacker-arrested/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T12:00:00.000Z</news:publication_date>
      <news:title>In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snyavv/is_grc_a_bad_fit_if_you_hate_presenting_to_groups/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T11:31:30.000Z</news:publication_date>
      <news:title>Is GRC a bad fit if you hate presenting to groups?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ddos-services-hit-by-police/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T11:30:00.000Z</news:publication_date>
      <news:title>DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snxye5/anthropics_mcp_protocol_has_critical_flaw/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T11:14:24.000Z</news:publication_date>
      <news:title>Anthropic's MCP Protocol has critical flaw affecting 200,000 servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snxqpu/cve202627913/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T11:03:42.000Z</news:publication_date>
      <news:title>CVE-2026-27913</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snxq67/built_a_free_cybersecurity_app_for_everyday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T11:03:00.000Z</news:publication_date>
      <news:title>Built a free cybersecurity app for everyday people and open sourced it, looking for contributors or someone to take it further</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/google-gemini-harmful-ads-blocking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T10:59:38.000Z</news:publication_date>
      <news:title>Google wipes out 602 million scam ads with Gemini on duty</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/google-blocks-83b-policy-violating-ads.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T10:47:00.000Z</news:publication_date>
      <news:title>Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/another-draftkings-hacker-sentenced-to-prison/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T10:45:13.000Z</news:publication_date>
      <news:title>Another DraftKings Hacker Sentenced to Prison</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/lawmakers-gathered-quietly-to-talk-about-ai-angst-and-fears-of-destruction-followed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T10:15:00.000Z</news:publication_date>
      <news:title>Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/microsoft-defender-zero-days-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T10:04:26.000Z</news:publication_date>
      <news:title>Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/regulation-standards-and-compliance/tsa-seeks-stakeholder-input-on-cybersecurity-reporting-requirements-assessment-burden-estimates-by-june-15/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T10:02:58.000Z</news:publication_date>
      <news:title>TSA seeks stakeholder input on cybersecurity reporting requirements, assessment burden estimates by June 15</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/madison-square-garden-jim-dolan-surveillance-machine/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T10:00:00.000Z</news:publication_date>
      <news:title>The Shocking Secrets of Madison Square Garden's Surveillance Machine</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snwj97/if_i_want_my_end_goal_to_be_in_grc_should_i_avoid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:59:53.000Z</news:publication_date>
      <news:title>If I want my end goal to be in GRC, should I avoid technical roles?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/nist/nist-advances-cmvp-modernization-to-close-gap-between-cryptographic-innovation-and-validation-capacity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:57:33.000Z</news:publication_date>
      <news:title>NIST advances CMVP modernization to close gap between cryptographic innovation and validation capacity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/emerson-partners-with-opswat-to-embed-ot-patch-management-into-ovation-platform-for-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:54:27.000Z</news:publication_date>
      <news:title>Emerson partners with OPSWAT to embed OT patch management into Ovation platform for critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/recent-apache-activemq-vulnerability-exploited-in-the-wild/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:50:22.000Z</news:publication_date>
      <news:title>Recent Apache ActiveMQ Vulnerability Exploited in the Wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/gitlab-18-11-agentic-ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:35:45.000Z</news:publication_date>
      <news:title>GitLab 18.11 brings agentic AI to security fixes, CI pipelines, and delivery analytics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-flags-apache-activemq-flaw-as-actively-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:30:15.000Z</news:publication_date>
      <news:title>CISA flags Apache ActiveMQ flaw as actively exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snvyeu/i_found_a_fake_crypto_app_in_an_official_store/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:26:06.000Z</news:publication_date>
      <news:title>I found a fake crypto app in an official store… this is getting scary</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/liongard-expands-liongardiq/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:23:17.000Z</news:publication_date>
      <news:title>Liongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/two-north-korean-it-worker-scheme-facilitators-jailed-in-the-us/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:21:02.000Z</news:publication_date>
      <news:title>Two North Korean IT Worker Scheme Facilitators Jailed in the US</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/mozilla-thunderbolt-open-source-ai-client-enterprise-data-control/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:03:30.000Z</news:publication_date>
      <news:title>Mozilla challenges enterprise AI providers with Thunderbolt, open-source AI client under your control</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.welivesecurity.com/en/scams/data-breach-alert-might-be-trap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T09:00:00.000Z</news:publication_date>
      <news:title>That data breach alert might be a trap</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snvged/new_microsoft_defender_redsun_zeroday_poc_grants/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T08:58:05.000Z</news:publication_date>
      <news:title>New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snvfj6/crtp_suggestions_about_the_exam/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T08:56:40.000Z</news:publication_date>
      <news:title>CRTP suggestions about the exam</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snv57e/built_a_job_board_for_offensive_roles/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T08:39:26.000Z</news:publication_date>
      <news:title>Built a job board for offensive roles</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/openai-codex-desktop-update-macos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T08:38:04.000Z</news:publication_date>
      <news:title>Codex can now operate between apps. Where are the boundaries?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/zionsiphon-malware-targets-ics-in-water-facilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T08:30:00.000Z</news:publication_date>
      <news:title>ZionSiphon Malware Targets ICS in Water Facilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-reboot-loops-affecting-some-domain-controllers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T07:59:47.000Z</news:publication_date>
      <news:title>Microsoft: Some Windows servers enter reboot loops after April patches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snu59o/whats_everyones_go_to_ccsp_cram_tools_got_a_month/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T07:41:44.000Z</news:publication_date>
      <news:title>What’s everyone’s go to CCSP cram tools. Got a month til the exam and struggling.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/your-shipment-has-arrived-email-hides-remote-access-software</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T07:40:03.000Z</news:publication_date>
      <news:title>“Your shipment has arrived” email hides remote access software</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snu2it/what_do_you_actually_do_after_getting_rce_in_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T07:37:16.000Z</news:publication_date>
      <news:title>What do you actually do after getting RCE in a Kubernetes pod?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/cursor-ai-vulnerability-exposed-developer-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T07:29:16.000Z</news:publication_date>
      <news:title>Cursor AI Vulnerability Exposed Developer Devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T07:14:00.000Z</news:publication_date>
      <news:title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/man-gets-30-months-for-selling-thousands-of-hacked-draftkings-accounts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T07:10:32.000Z</news:publication_date>
      <news:title>Man gets 30 months for selling thousands of hacked DraftKings accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sntcdg/is_the_google_certification_a_good_first_step/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T06:56:12.000Z</news:publication_date>
      <news:title>Is the Google Certification a good first step?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/53-ddos-domains-taken-down-by-law-enforcement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T06:40:21.000Z</news:publication_date>
      <news:title>53 DDoS Domains Taken Down by Law Enforcement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snsvza/t_mobile_cdrs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T06:30:41.000Z</news:publication_date>
      <news:title>T Mobile CDRS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snstph/preparing_for_summer_soc_analyst_internship/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T06:27:12.000Z</news:publication_date>
      <news:title>Preparing for Summer SOC Analyst Internship</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/recently-leaked-windows-zero-days-now-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T06:14:52.000Z</news:publication_date>
      <news:title>Recently leaked Windows zero-days now exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/android-17-beta-4-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T06:14:13.000Z</news:publication_date>
      <news:title>Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T05:46:00.000Z</news:publication_date>
      <news:title>Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/apple-airtag-relay-attack-location/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T05:30:35.000Z</news:publication_date>
      <news:title>Apple AirTag tracking can be misled by replayed Bluetooth signals</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/children-social-media-ban-cybersecurity-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T05:00:17.000Z</news:publication_date>
      <news:title>Social media bans might steer kids into riskier corners of the internet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/17/workplace-stress-report-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T04:30:16.000Z</news:publication_date>
      <news:title>Workplace stress in 2026 is still worse than before the pandemic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snpe1s/the_fcc_now_requires_telecom_licensees_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T03:28:37.000Z</news:publication_date>
      <news:title>the fcc now requires telecom licensees to disclose if foreign adversaries control their networks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T03:22:00.000Z</news:publication_date>
      <news:title>Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snoe20/do_i_have_a_shot_at_cybersecurity_career/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T02:42:28.000Z</news:publication_date>
      <news:title>Do I have a shot at cybersecurity career?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snno7g/open_grid_works/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T02:09:49.000Z</news:publication_date>
      <news:title>Open Grid Works</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32906</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T02:00:03.000Z</news:publication_date>
      <news:title>ISC Stormcast For Friday, April 17th, 2026 https://isc.sans.edu/podcastdetail/9896, (Fri, Apr 17th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snn9e5/what_are_some_of_the_best_antiphishing_tool_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T01:51:13.000Z</news:publication_date>
      <news:title>What are some of the best anti-phishing tool in the market as of 2026 for small to medium business as MSSP?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snn342/most_postadvisory_salesforce_reviews_missed_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T01:43:08.000Z</news:publication_date>
      <news:title>Most post-advisory Salesforce reviews missed the sharing rules layer. ShinyHunters didn't.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snm2i8/clicked_on_a_phishing_link/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T00:57:11.000Z</news:publication_date>
      <news:title>Clicked on a phishing link</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32904</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T00:30:27.000Z</news:publication_date>
      <news:title>Lumma Stealer infection with Sectop RAT (ArechClient2), (Fri, Apr 17th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snlc4c/what_is_the_outlook_for_web3_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T00:24:45.000Z</news:publication_date>
      <news:title>What is the outlook for Web3 security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snl1px/we_all_know_compliance_security_what_is_the_most/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T00:12:06.000Z</news:publication_date>
      <news:title>We all know compliance != security. What is the most frustrating "security theater" control you have to prove for SOC 2?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/us-nationals-sentenced-facilitate-north-korea-tech-worker-scheme/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T23:05:57.000Z</news:publication_date>
      <news:title>US nationals sentenced for aiding North Korea’s tech worker scheme</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snj2va/studying_for_security_and_looking_for_free_study/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T22:48:14.000Z</news:publication_date>
      <news:title>Studying for Security+ and looking for free study tools — what actually worked for you?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T22:26:34.000Z</news:publication_date>
      <news:title>Operation PowerOFF identifies 75k DDoS users, takes down 53 domains</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/zionsiphon-malware-designed-to-sabotage-water-treatment-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T22:04:53.000Z</news:publication_date>
      <news:title>ZionSiphon malware designed to sabotage water treatment systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T22:00:13.000Z</news:publication_date>
      <news:title>A Deep Dive Into Attempted Exploitation of CVE-2023-33538</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/nist-revamps-cve-framework-to-focus-on-high-impact-vulnerabilities</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T21:47:31.000Z</news:publication_date>
      <news:title>NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snhiil/on_quantum_cryptography_what_if_hackers_already/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T21:46:07.000Z</news:publication_date>
      <news:title>On quantum cryptography; What if hackers already have our encrypted passwords and they'll be able to easily hack into tons of accounts when they have the tools to decrypt it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sngpac/haproxy_http3_http1_desync_crossprotocol/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T21:15:19.000Z</news:publication_date>
      <news:title>HAProxy HTTP/3 -&gt; HTTP/1 Desync: Cross-Protocol Smuggling via a Standalone QUIC FIN (CVE-2026-33555)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1snglu3/redsun_how_windows_defenders_remediation_became_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T21:11:50.000Z</news:publication_date>
      <news:title>RedSun: How Windows Defender's Remediation Became a SYSTEM File Write</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sngj6u/secure_file_transfer_into_a_malware_sandbox_vm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T21:09:02.000Z</news:publication_date>
      <news:title>Secure File Transfer into a Malware Sandbox VM (ISO Method)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sngbf6/world_leaks_rdp_access_leads_to_custom/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T21:01:07.000Z</news:publication_date>
      <news:title>World Leaks: RDP Access Leads to Custom Exfiltration and Personalized Extortion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snfxb6/custombuilt_python_implant_analysis_deploying/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T20:46:44.000Z</news:publication_date>
      <news:title>Custom-Built Python Implant Analysis - Deploying Commodity RATs and Ransomware Reconnaissance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snfkw2/website_vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T20:34:20.000Z</news:publication_date>
      <news:title>Website vulnerability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T20:19:31.000Z</news:publication_date>
      <news:title>New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1snem8w/haproxy_http3_http1_desync_crossprotocol/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T19:59:49.000Z</news:publication_date>
      <news:title>HAProxy HTTP/3 -&gt; HTTP/1 Desync: Cross-Protocol Smuggling via a Standalone QUIC FIN (CVE-2026-33555)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/north-korea-clickfix-target-macos-users-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T19:42:45.000Z</news:publication_date>
      <news:title>North Korea Uses ClickFix to Target macOS Users' Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/frontier-ai-reinforces-the-future-of-modern-cyber-defense/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T19:33:10.000Z</news:publication_date>
      <news:title>Frontier AI Reinforces the Future of Modern Cyber Defense</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/harmless-global-adware-av-killer</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T19:07:26.000Z</news:publication_date>
      <news:title>'Harmless' Global Adware Transforms Into an AV Killer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/europes-online-age-verification-app-is-here/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T18:54:20.000Z</news:publication_date>
      <news:title>Europe’s Online Age Verification App Is Here</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/beating-the-mythos-clock-using-tenable-hexa-ai-custom-agents-for-automated-patching</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T18:35:00.000Z</news:publication_date>
      <news:title>Beating the Mythos clock: Using Tenable Hexa AI custom agents for automated patching</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1snb22f/now_you_can_break_up_with_big_tech_at_a_bar/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T17:54:05.000Z</news:publication_date>
      <news:title>Now you can break up with big tech at a bar: ‘cybersecurity disguised as a party’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T17:52:00.000Z</news:publication_date>
      <news:title>Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ddos-for-hire-takedowns-operation-poweroff/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T17:26:16.000Z</news:publication_date>
      <news:title>Officials seize 53 DDoS-for-hire domains in ongoing crackdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/government-cant-win-the-cyber-war-without-the-private-sector/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T17:00:00.000Z</news:publication_date>
      <news:title>Government Can’t Win the Cyber War Without the Private Sector</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T16:58:06.000Z</news:publication_date>
      <news:title>Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn9987/two_americans_sentenced_for_helping_north_korea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T16:52:34.000Z</news:publication_date>
      <news:title>Two Americans sentenced for helping North Korea steal 5 million in fake IT worker scheme</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/new-jersey-men-sentenced-north-korean-laptop-farms</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T16:38:00.000Z</news:publication_date>
      <news:title>New Jersey men given lengthy sentences for running North Korean laptop farms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn8a0b/in_your_experience_whats_the_most_effective/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T16:17:51.000Z</news:publication_date>
      <news:title>In your experience, what's the most effective cybersecurity awareness tip for employees?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/us-nationals-jailed-north-korea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T16:00:00.000Z</news:publication_date>
      <news:title>US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/16/building-your-cryptographic-inventory-a-customer-strategy-for-cryptographic-posture-management/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T16:00:00.000Z</news:publication_date>
      <news:title>Building your cryptographic inventory: A customer strategy for cryptographic posture management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn7fx9/the_rise_and_fall_of_conti_marked_a_major_moment/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:48:52.000Z</news:publication_date>
      <news:title>The rise and fall of Conti marked a major moment in cybersecurity history. It showed how organized and profitable ransomware had become, while also proving that internal leaks and poor decisions can destroy even powerful criminal groups.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn7d9j/known_vulnerability_on_maternity_leave/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:46:10.000Z</news:publication_date>
      <news:title>Known vulnerability on maternity leave</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/apk-malformation-android-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:45:00.000Z</news:publication_date>
      <news:title>APK Malformation Found in Thousands of Android Malware Samples</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/two-factor-authentication-breaks-free-from-the-desktop</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:28:15.000Z</news:publication_date>
      <news:title>Two-Factor Authentication Breaks Free from the Desktop</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/google/google-expands-gemini-ai-use-to-fight-malicious-ads-on-its-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:24:14.000Z</news:publication_date>
      <news:title>Google expands Gemini AI use to fight malicious ads on its platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn6kle/manager_is_inexperienced_and_relying_on_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:17:50.000Z</news:publication_date>
      <news:title>Manager is inexperienced and relying on AI prompts to articulate ideas</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/microsoftoriginal-windows-secure-boot-certificates-expire</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:16:30.000Z</news:publication_date>
      <news:title>Microsoft's Original Windows Secure Boot Certificate Is Expiring</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/16/claude-opus-4-7-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:06:44.000Z</news:publication_date>
      <news:title>Anthropic releases Claude Opus 4.7 with automated cybersecurity safeguards</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn67ks/certs_are_not_enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:05:21.000Z</news:publication_date>
      <news:title>Certs are not enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/cookeville-medical-center-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:01:00.000Z</news:publication_date>
      <news:title>Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:00:00.000Z</news:publication_date>
      <news:title>Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn5yen/google_play_is_changing_how_android_apps_access/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:56:46.000Z</news:publication_date>
      <news:title>Google Play is changing how Android apps access your contacts and location</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/analysis/hidden-risks-in-chinese-cellular-modules-grow-across-us-critical-infrastructure-as-market-dominance-amplifies-exposure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:41:12.000Z</news:publication_date>
      <news:title>Hidden risks in Chinese cellular modules grow across US critical infrastructure as market dominance amplifies exposure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/axonius-brings-ai-driven-exposure-management-to-ot-iot-environments-as-persistent-asset-visibility-gaps-hinder-security-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:36:30.000Z</news:publication_date>
      <news:title>Axonius brings AI-driven exposure management to OT, IoT environments, as persistent asset visibility gaps hinder security operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/tenable-embeds-native-ot-visibility-into-tenable-one-to-streamline-cyber-physical-security-remove-deployment-friction/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:33:51.000Z</news:publication_date>
      <news:title>Tenable embeds native OT visibility into Tenable One to streamline cyber-physical security, remove deployment friction</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/openai-widens-access-to-cybersecurity-model-after-anthropics-mythos-reveal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:27:06.000Z</news:publication_date>
      <news:title>OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn4pid/fashion_retailer_express_left_customers_personal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:11:53.000Z</news:publication_date>
      <news:title>Fashion retailer Express left customers' personal data and order details exposed to the internet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:09:11.000Z</news:publication_date>
      <news:title>New ATHR vishing platform uses AI voice agents for automated attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn4kug/trying_to_validate_an_idea_around_cloud_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:07:06.000Z</news:publication_date>
      <news:title>Trying to validate an idea around cloud security + critical systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/most-ai-socs-are-just-faster-triage-thats-not-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:02:12.000Z</news:publication_date>
      <news:title>Most "AI SOCs" Are Just Faster Triage. That's Not Enough.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cloud.google.com/blog/topics/threat-intelligence/defending-enterprise-ai-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T14:00:00.000Z</news:publication_date>
      <news:title>Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn49qp/eu_age_verification_app_already_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T13:55:59.000Z</news:publication_date>
      <news:title>EU age verification app already hacked.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn49cg/are_companies_overestimating_their_cloud_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T13:55:34.000Z</news:publication_date>
      <news:title>Are companies overestimating their cloud security maturity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn3xty/good_read_cybersecuritys_dirty_secret_why_most/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T13:43:30.000Z</news:publication_date>
      <news:title>Good Read: Cybersecurity’s Dirty Secret: Why Most Budgets Go to Waste</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sn3twv/codex_hacked_a_samsung_tv/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T13:39:17.000Z</news:publication_date>
      <news:title>Codex Hacked a Samsung TV</news:title>
    </news:news>
  </url>
</urlset>