<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shyorg/would_it_be_worth_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T20:45:59.000Z</news:publication_date>
      <news:title>Would it be worth it ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shxsex/found_a_pretty_solid_app_for_anyone_tackling_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T20:12:30.000Z</news:publication_date>
      <news:title>Found a pretty solid app for anyone tackling the ISACA AAIA certification</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shxqpt/can_someone_actually_hack_your_telegram_account/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T20:10:45.000Z</news:publication_date>
      <news:title>Can someone actually hack your Telegram account or do they have to gain access to your phone by other means or App? (Or by actually knowing your phone number, etc.?)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/hims-breach-exposes-sensitive-phi</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T20:02:30.000Z</news:publication_date>
      <news:title>Hims Breach Exposes the Most Sensitive Kinds of PHI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shx5iq/ransomware_knocks_dutch_healthcare_software/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T19:48:59.000Z</news:publication_date>
      <news:title>Ransomware knocks Dutch healthcare software vendor offline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/commerce-ai-export-regime-promotes-american-ai-adoption-abroad/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T19:40:00.000Z</news:publication_date>
      <news:title>Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shwslu/is_it_better_to_take_sans_sec504_in_person_or/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T19:35:59.000Z</news:publication_date>
      <news:title>Is it better to take SANS Sec504 in person or online?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/identity-access-management-security/your-next-breach-business-as-usual</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T19:21:55.000Z</news:publication_date>
      <news:title>Your Next Breach Will Look Like Business as Usual</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1shuftp/anthropics_mythos_will_force_a_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:11:16.000Z</news:publication_date>
      <news:title>Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/anthropics-mythos-will-force-a-cybersecurity-reckoning-just-not-the-one-you-think/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:08:37.000Z</news:publication_date>
      <news:title>Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/senator-launches-inquiry-into-tech-giants-csam</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:05:00.000Z</news:publication_date>
      <news:title>Senator launches inquiry into 8 tech giants for failures to adequately report CSAM</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1shtwdg/nmap_triage_without_a_backend_xslt_html_report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:52:29.000Z</news:publication_date>
      <news:title>Nmap triage without a backend: XSLT -&gt; HTML report that highlights unusual hosts/services</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/uk-threatens-tech-bosses-with-jail-ai-nudification</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:35:00.000Z</news:publication_date>
      <news:title>UK government threatens tech bosses with jail time if they do not adequately fight nudification tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/drift-crypto-theft-post-mortem-north-korea</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:33:00.000Z</news:publication_date>
      <news:title>‘It reads like a spy novel’: $280 million theft from Drift involved North Korean fake companies, cutouts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sht67b/claude_code_audit_confirmed_rce_via_environment/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:26:50.000Z</news:publication_date>
      <news:title>Claude Code Audit: Confirmed RCE via Environment Variable Injection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/product-tech/2026/04/10/the-mythos-inflection-point-dealing-with-the-upcoming-vulnerability-disclosure-avalanche-and-compressed-exploitation-window</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:26:25.000Z</news:publication_date>
      <news:title>The Mythos Inflection Point: Dealing With the Upcoming Vulnerability Disclosure Avalanche and Compressed Exploitation Window</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sht2jc/claude_code_audit_confirmed_rce_via_environment/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:23:15.000Z</news:publication_date>
      <news:title>Claude Code Audit: Confirmed RCE via Environment Variable Injection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shspiz/autowifi_opensource_wireless_penetration_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:10:33.000Z</news:publication_date>
      <news:title>AutoWIFI - Open-source wireless penetration testing framework (WPA/WPA2/WEP/WPS)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shso7o/mythos_is_likely_not_as_great_as_claimed_but_that/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:09:11.000Z</news:publication_date>
      <news:title>Mythos Is Likely Not As Great As Claimed But That Doesn’t Matter</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shsnq8/vulnhawk_opensource_aipowered_sast_scanner_with_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T17:08:43.000Z</news:publication_date>
      <news:title>VulnHawk - Open-source AI-powered SAST scanner with a free GitHub Action</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shryfs/built_a_network_packet_visualizer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T16:44:11.000Z</news:publication_date>
      <news:title>Built a Network packet visualizer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shrtpp/sans_classes_are_8700/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T16:39:35.000Z</news:publication_date>
      <news:title>SANS classes are $8700!?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shrncz/260328627_shors_algorithm_is_possible_with_as_few/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T16:33:18.000Z</news:publication_date>
      <news:title>[2603.28627] Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shrc7s/your_agent_is_mine_attacks_on_the_llm_supply_chain/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T16:22:23.000Z</news:publication_date>
      <news:title>Your Agent Is Mine: Attacks on the LLM Supply Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/scams/2026/04/fake-claude-site-installs-malware-that-gives-attackers-access-to-your-computer</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T16:16:26.000Z</news:publication_date>
      <news:title>Fake Claude site installs malware that gives attackers access to your computer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shqu76/claude_mythos_thread/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T16:04:40.000Z</news:publication_date>
      <news:title>Claude Mythos Thread</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/nearly-4-000-us-industrial-devices-exposed-to-iranian-cyberattacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:52:45.000Z</news:publication_date>
      <news:title>Nearly 4,000 US industrial devices exposed to Iranian cyberattacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/clickfix-finds-new-way-to-infect-macs</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:02:18.000Z</news:publication_date>
      <news:title>ClickFix finds a new way to infect Macs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/in-other-news-cyberattack-stings-stryker-windows-zero-day-china-supercomputer-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:44:53.000Z</news:publication_date>
      <news:title>In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shnst9/cyber_security_market_france_vs_belgium/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:15:53.000Z</news:publication_date>
      <news:title>Cyber security market : 🇫🇷France vs Belgium 🇧🇪</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shns6p/no_vpn_for_cloudfirst_approach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:15:15.000Z</news:publication_date>
      <news:title>No VPN for cloud-first approach?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/florida-investigates-openai-chatgpt-deadly-shooting</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:07:00.000Z</news:publication_date>
      <news:title>Florida investigates OpenAI for role ChatGPT may have played in deadly shooting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:01:11.000Z</news:publication_date>
      <news:title>Analysis of one billion CISA KEV remediation records exposes limits of human-scale security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/juniper-networks-patches-dozens-of-junos-os-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:44:17.000Z</news:publication_date>
      <news:title>Juniper Networks Patches Dozens of Junos OS Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1shmvbl/nuitka_to_python_nuitka_is_not_really_cython_code/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:40:26.000Z</news:publication_date>
      <news:title>Nuitka to python. Nuitka is not really cython code due to dependencies I recommend to create new python compiler for protect your source not by weak compiler like Nuitka also you need decrypt xored nuitka blob in 4.0 (very easy task)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/ics-ot-security/industrial-controllers-vulnerable-conflicts-cyber</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:30:00.000Z</news:publication_date>
      <news:title>Industrial Controllers Still Vulnerable As Conflicts Move to Cyber</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/clickfix-mac-malware-script-editor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:29:09.000Z</news:publication_date>
      <news:title>ClickFix campaign delivers Mac malware via fake Apple page</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:23:00.000Z</news:publication_date>
      <news:title>GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:12:42.000Z</news:publication_date>
      <news:title>Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shm2d7/from_blindness_to_cybersecurity_this_is_my_journey/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:08:11.000Z</news:publication_date>
      <news:title>From blindness to cybersecurity, this is my journey!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shm0p9/quitting_cyber_after_7_years/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:06:14.000Z</news:publication_date>
      <news:title>Quitting cyber after 7 years</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shlzih/cpuid_site_hijacked_to_serve_malware_instead_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:04:51.000Z</news:publication_date>
      <news:title>CPUID site hijacked to serve malware instead of HWMonitor downloads</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/uk-says-it-exposed-russian-submarine-activity</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:03:00.000Z</news:publication_date>
      <news:title>UK says it exposed Russian submarine activity near undersea cables</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-15-7/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:00:39.000Z</news:publication_date>
      <news:title>The Good, the Bad and the Ugly in Cybersecurity – Week 15</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shlvco/help_i_think_i_ran_fake_cloudflare_winr_prompt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:00:24.000Z</news:publication_date>
      <news:title>HELP : I think i ran Fake Cloudflare “Win+R” prompt</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/anthropic-exploit-writing-mythos-ai-safe</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:00:00.000Z</news:publication_date>
      <news:title>Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shlqjs/arch_linux_and_schrödingers_containers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:54:49.000Z</news:publication_date>
      <news:title>Arch Linux and Schrödinger's containers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:41:08.000Z</news:publication_date>
      <news:title>Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shlaoe/how_do_you_use_ai_for_your_work/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:36:17.000Z</news:publication_date>
      <news:title>How do you use AI for your work?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shkwme/renovate_dependabot_the_new_malware_delivery/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:19:12.000Z</news:publication_date>
      <news:title>Renovate &amp; Dependabot: The New Malware Delivery System</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/crushing-axios-supply-chain-threat-tenable-hexa-ai-agentic-ai-use-cases</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:10:00.000Z</news:publication_date>
      <news:title>Crushing the Axios supply chain threat with Tenable Hexa AI: Use cases for agentic AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shklt5/website_glitch_report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:05:32.000Z</news:publication_date>
      <news:title>Website glitch report</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/three-ransomware-gangs-40-percent/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:00:00.000Z</news:publication_date>
      <news:title>Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:56:14.000Z</news:publication_date>
      <news:title>Microsoft: Canadian employees targeted in payroll pirate attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:53:45.000Z</news:publication_date>
      <news:title>Orthanc DICOM Vulnerabilities Lead to Crashes, RCE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/poisoned-office-365-search-results-lead-to-stolen-paychecks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:30:35.000Z</news:publication_date>
      <news:title>Poisoned “Office 365” search results lead to stolen paychecks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shjsa7/cpuz_and_hwmonitor_compromised/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:26:11.000Z</news:publication_date>
      <news:title>CPUZ and HWmonitor compromised</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/google-chrome-protection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:25:00.000Z</news:publication_date>
      <news:title>Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:00:00.000Z</news:publication_date>
      <news:title>Browser Extensions Are the New AI Consumption Channel That No One Is Talking About</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shj6ov/come_prepararsi_al_meglio_per_lesame_oscp_del_2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:55:31.000Z</news:publication_date>
      <news:title>Come prepararsi al meglio per l'esame OSCP del 2026?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shj2yo/anthropic_model_scare_sparks_urgent_bessent/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:50:06.000Z</news:publication_date>
      <news:title>Anthropic Model Scare Sparks Urgent Bessent, Powell Warning to Bank CEOs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1shj1uj/taiwanese_prosecutors_seize_66m_in_assets_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:48:25.000Z</news:publication_date>
      <news:title>Taiwanese Prosecutors Seize $6.6M in Assets from Incognito Market Admin "Pharoah" (Lin Rui-siang)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shizuu/observed_a_clipboard_injection_attack_via_fake/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:45:25.000Z</news:publication_date>
      <news:title>Observed a clipboard injection attack via fake verification page (developer-targeted)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:44:45.000Z</news:publication_date>
      <news:title>Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/google/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:44:08.000Z</news:publication_date>
      <news:title>Google rolls out Gmail end-to-end encryption on mobile devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1shijta/static_analysis_of_ios_app_store_binaries_common/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:21:32.000Z</news:publication_date>
      <news:title>Static analysis of iOS App Store binaries: common vulnerabilities I keep finding after 15 years in mobile security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shihny/how_are_you_managing_microsoft_defender_xdr/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:18:16.000Z</news:publication_date>
      <news:title>How are you managing Microsoft Defender XDR? (Triage &amp; Tuning help)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/google-gmail-e2ee-mobile-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:53:48.000Z</news:publication_date>
      <news:title>Gmail’s end-to-end encryption comes to mobile, no extra apps required</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/mitre-releases-fight-fraud-framework/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:51:03.000Z</news:publication_date>
      <news:title>MITRE Releases Fight Fraud Framework</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/building-management-systems/claroty-says-cea-852-adoption-accelerates-risk-as-building-systems-become-exposed-to-critical-infrastructure-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:26:41.000Z</news:publication_date>
      <news:title>Claroty says CEA-852 adoption accelerates risk as building systems become exposed to critical infrastructure threats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/google-chrome-device-bound-session-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:21:07.000Z</news:publication_date>
      <news:title>To counter cookie theft, Chrome ships device-bound session credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/internet-exposed-ics-devices-running-insecure-modbus-leave-critical-infrastructure-open-to-disruption-comparitech-finds/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:20:30.000Z</news:publication_date>
      <news:title>Internet-exposed ICS devices running insecure Modbus leave critical infrastructure open to disruption, Comparitech finds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/critical-marimo-flaw-exploited-hours-after-public-disclosure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:12:48.000Z</news:publication_date>
      <news:title>Critical Marimo Flaw Exploited Hours After Public Disclosure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shh8zn/iranian_cyber_attacks_move_from_disruptive_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:05:50.000Z</news:publication_date>
      <news:title>Iranian cyber attacks move from disruptive to complex threats in Gulf</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/little-snitch-for-linux-privacy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T08:36:54.000Z</news:publication_date>
      <news:title>Little Snitch for Linux shows what your apps are connecting to</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/apiiro-cli-turns-ai-coding-assistants-into-full-stack-security-engineers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T08:33:05.000Z</news:publication_date>
      <news:title>Apiiro CLI turns AI coding assistants into full-stack security engineers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shgbfp/ideas_for_a_simple_usb_attack_demo_for_class/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T08:09:58.000Z</news:publication_date>
      <news:title>Ideas for a simple USB “attack” demo (for class)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:58:00.000Z</news:publication_date>
      <news:title>Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-rolls-out-cookie-theft-protections-in-chrome/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:50:00.000Z</news:publication_date>
      <news:title>Google Rolls Out Cookie Theft Protections in Chrome</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:37:00.000Z</news:publication_date>
      <news:title>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/microsoft-finds-vulnerability-exposing-millions-of-android-crypto-wallet-users/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:33:16.000Z</news:publication_date>
      <news:title>Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/april-2026-patch-tuesday-forecast/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:22:04.000Z</news:publication_date>
      <news:title>April 2026 Patch Tuesday forecast: Spring-cleaning of a preview</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shf24u/is_there_a_course_or_a_roadmap_related_to_soc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T06:55:44.000Z</news:publication_date>
      <news:title>Is there a course or a roadmap related to SOC Engineering.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32884</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T06:40:46.000Z</news:publication_date>
      <news:title>Obfuscated JavaScript or Nothing, (Thu, Apr 9th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T06:28:00.000Z</news:publication_date>
      <news:title>Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shds1f/hack_town_forum_to_return_april_13th/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:42:36.000Z</news:publication_date>
      <news:title>Hack Town forum to return April 13th</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shdny9/github_momenbaselhtbwriteups_the_most/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:36:07.000Z</news:publication_date>
      <news:title>GitHub - momenbasel/htb-writeups: The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack path diagrams, ProLabs, Sherlocks, OSCP/CPTS/CRTO prep. Browse: momenbasel.github.io/htb-writeups</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/aqsa-taylor-exaforce-vibe-hunting/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:30:50.000Z</news:publication_date>
      <news:title>What vibe hunting gets right about AI threat hunting, and where it breaks down</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/health-insurance-lead-generation-privacy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:00:30.000Z</news:publication_date>
      <news:title>Health insurance lead sites sell personal data within seconds of form submission</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1shcqyf/slipping_up_slippi_with_spectator_rce/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T04:45:58.000Z</news:publication_date>
      <news:title>Slipping up Slippi with spectator RCE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/product-showcase-session-a-messenger-without-phone-numbers-or-metadata/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T04:30:54.000Z</news:publication_date>
      <news:title>Product showcase: Session, a messenger without phone numbers or metadata</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/10/new-infosec-products-of-the-week-april-10-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T04:00:32.000Z</news:publication_date>
      <news:title>New infosec products of the week: April 10, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shai5n/recycled_phone_numbers_pose_a_major_security_risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T02:54:20.000Z</news:publication_date>
      <news:title>Recycled phone numbers pose a major security risk today and should not be tolerated despite their downsides.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1shahe3/describe_a_vulnerability_ai_spins_up_the_lab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T02:53:19.000Z</news:publication_date>
      <news:title>Describe a vulnerability → AI spins up the lab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh8on7/free_cert_readiness_calculator_for_security_certs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T01:31:46.000Z</news:publication_date>
      <news:title>Free cert readiness calculator for security certs — domain-weighted scoring</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh7r71/made_a_site_for_cybersecurity_insights_feedback/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T00:50:22.000Z</news:publication_date>
      <news:title>Made a site for cybersecurity insights (feedback wanted)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52509</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T00:00:00.000Z</news:publication_date>
      <news:title>[local] NetBT e-Fatura - Privilege Escalation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52508</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] D-Link DIR-650IN - Authenticated Command Injection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/chipsoft-ransomware-attack-disrupts-dutch-hospitals</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T23:00:00.000Z</news:publication_date>
      <news:title>Dutch hospitals face disruptions after ransomware attack on software provider ChipSoft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T22:04:31.000Z</news:publication_date>
      <news:title>New ‘LucidRook’ malware used in targeted attacks on NGOs, universities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:37:04.000Z</news:publication_date>
      <news:title>New VENOM phishing attacks steal senior executives' Microsoft logins</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh31gt/security_engineer_role_is_it_for_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:32:58.000Z</news:publication_date>
      <news:title>Security engineer role, is it for me?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/iran-attackers-industrial-ot-government-energy-water-censys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:29:16.000Z</news:publication_date>
      <news:title>Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/quantum-computing-industry-timeline-threat-accelerating/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:05:40.000Z</news:publication_date>
      <news:title>Why is the timeline to quantum-proof everything constantly shrinking?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh2am9/can_i_get_a_sec_in_15_months/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:04:29.000Z</news:publication_date>
      <news:title>Can I get a Sec+ in 1.5 months?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/russias-fancy-bear-apt-continues-global-onslaught</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:50:37.000Z</news:publication_date>
      <news:title>Russia's 'Fancy Bear' APT Continues Its Global Onslaught</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh1pi4/cybersecurity_statistics_of_the_week_march_30th/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:42:15.000Z</news:publication_date>
      <news:title>Cybersecurity statistics of the week (March 30th - April 5th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh1iwq/ailed_remediation_crisis_prompts_hackerone_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:35:33.000Z</news:publication_date>
      <news:title>AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/what-to-know-about-cyberav3ngers-the-irgc-linked-group-targeting-critical-infrastructure</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:28:27.000Z</news:publication_date>
      <news:title>What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/bluehammer-windows-exploit-microsoft-bug-disclosure-issues</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:13:34.000Z</news:publication_date>
      <news:title>'BlueHammer' Windows Zero-Day Exploit Signals Microsoft Bug Disclosure Issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh0jvn/hackers_steal_and_leak_sensitive_lapd_police/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:00:20.000Z</news:publication_date>
      <news:title>Hackers steal and leak sensitive LAPD police documents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh0h8z/is_cyber_hiring_too_dependent_on_cvs_and_keyword/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:57:45.000Z</news:publication_date>
      <news:title>Is cyber hiring too dependent on CVs and keyword matching?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fcc-proposes-new-rule-robocall-crackdown</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:57:00.000Z</news:publication_date>
      <news:title>FCC proposes new rule to further crackdown on illegal robocalls</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sh0beg/chrome_introduces_hardwarebound_session/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:51:55.000Z</news:publication_date>
      <news:title>Chrome introduces hardware-bound session protection to fight infostealer malware.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/healthcare-it-solutions-provider-chipsoft-hit-by-ransomware-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:46:44.000Z</news:publication_date>
      <news:title>Healthcare IT solutions provider ChipSoft hit by ransomware attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/09/the-agentic-soc-rethinking-secops-for-the-next-decade/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:00:00.000Z</news:publication_date>
      <news:title>The agentic SOC—Rethinking SecOps for the next decade</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/google-chrome-adds-infostealer-protection-against-session-cookie-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:33:29.000Z</news:publication_date>
      <news:title>Google Chrome adds infostealer protection against session cookie theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:26:00.000Z</news:publication_date>
      <news:title>EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgw6b7/petabytes_stolen_ai_tools_emerged_and_a_new_us/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:25:30.000Z</news:publication_date>
      <news:title>Petabytes Stolen, AI Tools Emerged, and a New U.S. Cyber Strategy—Tin foil Hatting or are the Dots Connecting?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/treasury-department-announces-crypto-info-sharing</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:25:00.000Z</news:publication_date>
      <news:title>Treasury Department announces crypto industry cyber threat sharing initiative</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgw4li/us_treasury_to_loop_in_crypto_sector_on_hacker/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:23:52.000Z</news:publication_date>
      <news:title>U.S. Treasury to loop in crypto sector on hacker warnings shared with traditional firms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgw484/oscp_cloud_solutions_architect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:23:30.000Z</news:publication_date>
      <news:title>OSCP + Cloud Solutions Architect</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgvx7a/need_help_for_upcoming_interview_in_reliaquest/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:16:52.000Z</news:publication_date>
      <news:title>Need help for upcoming interview in ReliaQuest.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgvupi/pcgamer_lol_microsoft_shutting_down_wiregaurd/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:14:29.000Z</news:publication_date>
      <news:title>PCGAMER: LOL, Microsoft shutting down WireGaurd, VeraCrypt and other was just an email oopsie! How silly that people are making a big deal of it!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-analytics/ceasefires-slow-cyberattacks-history</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:04:51.000Z</news:publication_date>
      <news:title>Do Ceasefires Slow Cyberattacks? History Suggests Not</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sgv3se/the_naclcon_salt_con_speaker_list_is_out_may/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:48:09.000Z</news:publication_date>
      <news:title>The NaClCON (Salt Con) speaker list is out! May 31–June 2, Carolina Beach NC</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sguy3u/misconfiguration_is_reason_cybersecurity_firms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:42:36.000Z</news:publication_date>
      <news:title>Misconfiguration is reason cybersecurity firms are targeting Salesforce</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/uat-10362-targets-taiwanese-ngos-with.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:23:00.000Z</news:publication_date>
      <news:title>UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:15:26.000Z</news:publication_date>
      <news:title>Smart Slider updates hijacked to push malicious WordPress, Joomla versions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgu5t0/fbi_extracted_the_notification_database_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:14:26.000Z</news:publication_date>
      <news:title>FBI extracted the notification database of Suspect's iPhone to read Signal messages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/product-tech/2026/04/09/scaling-modern-appsec-moving-from-static-profiles-to-ai-powered-scan-optimization</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:10:52.000Z</news:publication_date>
      <news:title>Scaling Modern AppSec: Moving from Static Profiles to AI-Powered Scan Optimization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sgu2dn/threat_model_discrepancy_google_password_manager/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:10:52.000Z</news:publication_date>
      <news:title>Threat Model Discrepancy: Google Password Manager leaks cleartext passwords via Task Switcher (Won't Fix) - Violates German BSI Standards</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgtavw/github_schichluckyspark_a_stealthy_easy_to_use/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:43:43.000Z</news:publication_date>
      <news:title>GitHub - Schich/Lucky-Spark: A stealthy easy to use loader for shellcode staged with http/https like Sliver</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgt680/google_password_manager_leaks_cleartext_passwords/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:39:04.000Z</news:publication_date>
      <news:title>Google Password Manager leaks cleartext passwords via Task Switcher. Google says "Won't Fix", German BSI says "Vulnerability".</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fbi-operation-masquerade-russian-gru-router-takedown-brett-leatherman/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:34:14.000Z</news:publication_date>
      <news:title>Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgt00r/what_are_the_best_job_sites_to_use_when_looking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:32:56.000Z</news:publication_date>
      <news:title>What are the best job sites to use when looking for cybersecurity jobs, or just IT jobs (in general)??</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgshh1/i_am_looking_for_api_to_check_categories_of_url/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:14:32.000Z</news:publication_date>
      <news:title>I am looking for API to check categories of URL</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/russia-accuses-radio-free-europe-journalist-aiding-ukraine-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:02:00.000Z</news:publication_date>
      <news:title>Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/product-tech/2026/04/09/1aws-cloud-security-best-practices-guide</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:00:00.000Z</news:publication_date>
      <news:title>12 Best Practices for Securing AWS Cloud in 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/stx-rat-targets-finance-sector/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:00:00.000Z</news:publication_date>
      <news:title>STX RAT Targets Finance Sector With Advanced Stealth Tactics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:00:00.000Z</news:publication_date>
      <news:title>Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/claude-managed-agents-bring-execution-and-control-to-ai-agent-workflows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T14:31:52.000Z</news:publication_date>
      <news:title>Claude Managed Agents bring execution and control to AI agent workflows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/mylovely-ai-data-breach-user-conversations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T14:22:35.000Z</news:publication_date>
      <news:title>113,000 explicit prompts from AI girlfriend platform exposed, many linked to user IDs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/when-attackers-already-have-the-keys-mfa-is-just-another-door-to-open/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T14:02:12.000Z</news:publication_date>
      <news:title>When attackers already have the keys, MFA is just another door to open</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/bitcoin-depot-dollar36m-crypto/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T14:01:00.000Z</news:publication_date>
      <news:title>Bitcoin Depot Reports $3.6m Crypto Theft After System Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgqglq/security_researchers_tricked_apple_intelligence/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T14:00:52.000Z</news:publication_date>
      <news:title>Security researchers tricked Apple Intelligence into cursing at users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgq616/snoopy_adolf_and_password_the_hungarian/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:49:18.000Z</news:publication_date>
      <news:title>‘Snoopy’, ‘Adolf’ and ‘Password’: The Hungarian Government Passwords Exposed Online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgq0fz/hackers_exploiting_acrobat_reader_zeroday_flaw/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:43:13.000Z</news:publication_date>
      <news:title>Hackers exploiting Acrobat Reader zero-day flaw since December</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:43:07.000Z</news:publication_date>
      <news:title>Apple Intelligence AI Guardrails Bypassed in New Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/can-we-trust-ai-no-but-eventually-we-must/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:30:00.000Z</news:publication_date>
      <news:title>Can we Trust AI? No – But Eventually We Must</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/09/intent-redirection-vulnerability-third-party-sdk-android/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:21:18.000Z</news:publication_date>
      <news:title>Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/scammers-pose-as-amazon-support-to-steal-your-account</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:05:44.000Z</news:publication_date>
      <news:title>Scammers pose as Amazon support to steal your account</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:04:54.000Z</news:publication_date>
      <news:title>Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/edge-decay-how-a-failing-perimeter-is-fueling-modern-intrusions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:00:49.000Z</news:publication_date>
      <news:title>Edge Decay: How a Failing Perimeter Is Fueling Modern Intrusions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/mallory-ai-native-threat-intelligence-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:00:36.000Z</news:publication_date>
      <news:title>Mallory brings contextual threat intelligence to security operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:57:00.000Z</news:publication_date>
      <news:title>ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/censys-warns-systemic-exposure-of-rockwell-plcs-enable-iran-linked-targeting-of-critical-infrastructure-ot-networks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:55:08.000Z</news:publication_date>
      <news:title>Censys warns systemic exposure of Rockwell PLCs enable Iran-linked targeting of critical infrastructure OT networks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgogf9/black_box_to_black_box_is_builtin_governance_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:38:57.000Z</news:publication_date>
      <news:title>Black Box to Black Box - Is 'Built-in' Governance for AI Agents a major security anti-pattern?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-api-keys-in-android-apps-expose-gemini-endpoints-to-unauthorized-access/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:26:50.000Z</news:publication_date>
      <news:title>Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/webinar-from-noise-to-signal-what-threat-actors-are-targeting-next/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:20:28.000Z</news:publication_date>
      <news:title>Webinar: From noise to signal - What threat actors are targeting next</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgnyqe/tracking_frameworks_nist_andor_cis_controls/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:16:57.000Z</news:publication_date>
      <news:title>Tracking Frameworks - NIST and/or CIS Controls</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgnxlq/what_should_i_prepare_for_a_soc_tier_2_interview/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:15:35.000Z</news:publication_date>
      <news:title>What should I prepare for a SOC Tier 2 interview?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgntdq/working_on_a_big_four_advice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:10:24.000Z</news:publication_date>
      <news:title>Working on a big four - Advice</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/crypto-atm-bitcoin-depot-reports-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:10:00.000Z</news:publication_date>
      <news:title>Cryptocurrency ATM giant Bitcoin Depot reports $3.6 million stolen in cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/industrialized-fraud-ai-identity-theft-prevention-op-ed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:00:00.000Z</news:publication_date>
      <news:title>Don’t just fight fraud, hunt it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/opswat-adds-predictive-ai-engine-to-metadefender-for-pre-execution-threat-detection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:59:55.000Z</news:publication_date>
      <news:title>OPSWAT adds predictive AI engine to MetaDefender for pre-execution threat detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/palo-alto-networks-sonicwall-patch-high-severity-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:58:52.000Z</news:publication_date>
      <news:title>Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgngq0/eurail_says_december_data_breach_impacts_300000/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:54:28.000Z</news:publication_date>
      <news:title>Eurail says December data breach impacts 300,000 individuals</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgnd04/completed_comptia_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:49:29.000Z</news:publication_date>
      <news:title>Completed CompTIA security+</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/acrobat-reader-zero-day-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:44:19.000Z</news:publication_date>
      <news:title>Acrobat Reader zero-day exploited in the wild for many months</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/the-hidden-security-risks-of-shadow-ai.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:31:00.000Z</news:publication_date>
      <news:title>The Hidden Security Risks of Shadow AI in Enterprises</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/intruder-container-image-scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:23:15.000Z</news:publication_date>
      <news:title>Intruder expands cloud security with agentless container image scanning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/atomic-stealer-macos-clickfix/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:20:00.000Z</news:publication_date>
      <news:title>Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:15:00.000Z</news:publication_date>
      <news:title>Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/nsfw-app-leak-exposes-70000-prompts-linked-to-individual-users</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:02:51.000Z</news:publication_date>
      <news:title>NSFW app leak exposes 70,000 prompts linked to individual users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/the-hidden-roi-of-visibility-better-decisions-better-behavior-better-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:00:00.000Z</news:publication_date>
      <news:title>The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/middle-east-hack-operation-bitter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:45:00.000Z</news:publication_date>
      <news:title>Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:40:00.000Z</news:publication_date>
      <news:title>Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:31:54.000Z</news:publication_date>
      <news:title>Eurail says December data breach impacts 300,000 individuals</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/advenica-file-scanner-kiosk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:22:36.000Z</news:publication_date>
      <news:title>Advenica’s File Scanner Kiosk scans USB media for malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/data-breaches/2026/04/30000-private-facebook-images-allegedly-downloaded-by-meta-employee</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:07:37.000Z</news:publication_date>
      <news:title>30,000 private Facebook images allegedly downloaded by Meta employee</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sglba8/applying_soarstyle_automation_to_physical/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:01:11.000Z</news:publication_date>
      <news:title>Applying SOAR-style automation to physical perimeter security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/political-campaign-security-spending/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:00:00.000Z</news:publication_date>
      <news:title>Politicians Are Spending More Money on Security as They Increasingly Become Targets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/governance-gaps-agents-76-increase/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:00:00.000Z</news:publication_date>
      <news:title>Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-warns-of-new-campaign-targeting-bpos-to-steal-corporate-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:44:56.000Z</news:publication_date>
      <news:title>Google Warns of New Campaign Targeting BPOs to Steal Corporate Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/scams/2026/04/this-fake-windows-support-website-delivers-password-stealing-malware</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:40:52.000Z</news:publication_date>
      <news:title>This fake Windows support website delivers password-stealing malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:22:35.000Z</news:publication_date>
      <news:title>Hackers exploiting Acrobat Reader zero-day flaw since December</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/whatsapp-username-privacy-feature/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:11:42.000Z</news:publication_date>
      <news:title>WhatsApp brings long-awaited privacy control over who can contact you</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/meta-muse-spark-personal-superintelligence/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:53:48.000Z</news:publication_date>
      <news:title>Meta’s Muse Spark takes AI a step closer to personal superintelligence</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/adobe-reader-zero-day-exploited-for-months-researcher/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:44:51.000Z</news:publication_date>
      <news:title>Adobe Reader Zero-Day Exploited for Months: Researcher</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgjyz2/quick_and_simple_what_certs_have_you_found_or/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:39:30.000Z</news:publication_date>
      <news:title>Quick and Simple: what certs have you found or noticed get you more interviews? For SOC, GRC, Network, or even help desk?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/google-warns-group-targeting-bpos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:35:00.000Z</news:publication_date>
      <news:title>Google Warns of New Threat Group Targeting BPOs and Helpdesks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/300000-people-impacted-by-eurail-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:28:05.000Z</news:publication_date>
      <news:title>300,000 People Impacted by Eurail Data Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/ccn-reports-cybersecurity-maturity-becoming-prerequisite-in-critical-infrastructure-industrial-supply-chains/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:27:48.000Z</news:publication_date>
      <news:title>CCN reports cybersecurity maturity becoming prerequisite in critical infrastructure, industrial supply chains</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/critical-infrastructure/uk-ncsc-says-apt28-exploits-routers-for-dns-hijacking-enabling-large-scale-traffic-interception/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:24:56.000Z</news:publication_date>
      <news:title>UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/utilities-energy-power-water-waste/doe-allocates-160-million-to-secure-energy-systems-as-cyber-threats-converge-with-grid-modernization/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:18:03.000Z</news:publication_date>
      <news:title>DOE allocates $160 million to secure energy systems as cyber threats converge with grid modernization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/crypto-atm-giant-bitcoin-depot-says-hackers-stole-36-million-from-its-wallets/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:44:55.000Z</news:publication_date>
      <news:title>Hackers steal $3.6 million from crypto ATM giant Bitcoin Depot</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-suspends-dev-accounts-for-high-profile-open-source-projects/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T06:46:26.000Z</news:publication_date>
      <news:title>Microsoft suspends dev accounts for high-profile open source projects</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/3-6-million-stolen-in-bitcoin-depot-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T06:41:40.000Z</news:publication_date>
      <news:title>$3.6 Million Stolen in Bitcoin Depot Hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sghclb/the_whitelist_won_how_anthropic_turned_a_pentagon/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T06:04:07.000Z</news:publication_date>
      <news:title>The Whitelist Won: How Anthropic Turned a Pentagon Blacklist into a Consortium</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sggxcp/soc_analysts_what_helped_you_connect_siem_edr_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T05:40:19.000Z</news:publication_date>
      <news:title>SOC analysts - what helped you connect SIEM, EDR, and threat hunting in real scenarios?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/itamar-apelblat-token-security-ai-agents-security-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T05:30:01.000Z</news:publication_date>
      <news:title>AI agent intent is a starting point, not a security strategy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/asqav-ai-agent-audit-trail/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T05:00:12.000Z</news:publication_date>
      <news:title>Asqav: Open-source SDK for AI agent governance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/saas-platforms-notification-systems-phishing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T04:30:03.000Z</news:publication_date>
      <news:title>Phishers sneak through using GitHub and Jira’s own mail delivery infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgfcor/security_officer_in_healthcare/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T04:16:40.000Z</news:publication_date>
      <news:title>Security Officer in Healthcare</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/09/genai-prompt-injection-enterprise-data-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T04:00:19.000Z</news:publication_date>
      <news:title>Prompt injection tags along as GenAI enters daily government use</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32882</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T02:00:03.000Z</news:publication_date>
      <news:title>ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sgbuw7/ai_is_creating_more_cybersecurity_work/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T01:32:06.000Z</news:publication_date>
      <news:title>AI is creating more cybersecurity work</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/shaky-ceasefire-unlikely-to-stop-cyberattacks-from-iran-linked-hackers-for-long/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T01:22:35.000Z</news:publication_date>
      <news:title>Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/russia-forest-blizzard-logins-soho-routers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T01:00:00.000Z</news:publication_date>
      <news:title>Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32866</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T00:58:14.000Z</news:publication_date>
      <news:title>Number Usage in Passwords: Take Two, (Thu, Apr 9th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sganbu/two_former_heads_of_cisa_and_ncsc_now_work_at_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T00:37:40.000Z</news:publication_date>
      <news:title>Two former heads of CISA and NCSC now work at a program funded by the Ukraine-sanctioned, Soviet-born billionaire owner of Warner Music</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/elastic-defence-cyber-marvel</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T00:00:00.000Z</news:publication_date>
      <news:title>Elastic on Defence Cyber Marvel 2026: A Technical overview from the Exercise Floor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52505</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] RomM  4.4.0 -  XSS_CSRF Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52506</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] React Server 19.2.0 - Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52504</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Jumbo Website Manager  - Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/recorded-future-sees-its-inclusion-in-the-2026-forrester-wave</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T00:00:00.000Z</news:publication_date>
      <news:title>Third-Party Risk Is an Intelligence Operation. It's Time We Treated It Like One.</news:title>
    </news:news>
  </url>
</urlset>