<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fortinet-rushes-emergency-fixes-for-exploited-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:37:28.000Z</news:publication_date>
      <news:title>Fortinet Rushes Emergency Fixes for Exploited Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdtqh2/found_a_forgotten_public_s3_bucket_with_40k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:11:19.000Z</news:publication_date>
      <news:title>Found a "forgotten" public S3 bucket with 40k+ customer KYC docs at my new gig</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32870</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:50:27.000Z</news:publication_date>
      <news:title>How often are redirects used in phishing in 2026&amp;#x3f;, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdt12c/gave_everything_to_a_technical_assessment_only_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:27:33.000Z</news:publication_date>
      <news:title>Gave everything to a technical assessment only to get rejected because the position was already filled - how do you handle this?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sds2bv/is_oneman_ciso_role_worth_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:28:21.000Z</news:publication_date>
      <news:title>Is one-man CISO role worth it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-march-30-april-5-2</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:01:00.000Z</news:publication_date>
      <news:title>A week in security (March 30 &amp;#8211; April 5)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:59:00.000Z</news:publication_date>
      <news:title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrh2y/htb_media_machine_walkthrough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:53:13.000Z</news:publication_date>
      <news:title>HTB Media Machine Walkthrough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrc73/interesting_leakixnet_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:44:51.000Z</news:publication_date>
      <news:title>Interesting leakix.net scanning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdr9ip/built_a_tool_to_find_which_of_your_gcp_api_keys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:40:26.000Z</news:publication_date>
      <news:title>Built a tool to find which of your GCP API keys now have Gemini access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/residential-proxy-attack-traffic-ip-reputation-enterprise-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:30:05.000Z</news:publication_date>
      <news:title>Residential proxies make a mockery of IP-based defenses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/product-showcase-proton-authenticator-encrypted-open-source-2fa-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:00:39.000Z</news:publication_date>
      <news:title>Product showcase: Proton Authenticator is an end-to-end encrypted, open source 2FA app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp8wh/고배당_특정_숫자_베팅에_쏠리는_데이터_패턴의_기술적_해석/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:46:00.000Z</news:publication_date>
      <news:title>고배당 특정 숫자 베팅에 쏠리는 데이터 패턴의 기술적 해석</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp2zz/hidomgdetect_linux_driver_in_development_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:36:55.000Z</news:publication_date>
      <news:title>hid-omg-detect: Linux driver in development to detect malicious HID devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/enterprise-wireless-networks-security-exposure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:30:10.000Z</news:publication_date>
      <news:title>IT talent looks the other way as wireless security incidents pile up</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/rh-isac-enterprise-security-spending-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:00:36.000Z</news:publication_date>
      <news:title>CISOs grapple with AI demands within flat budgets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdnuib/how_md5_hashing_works_and_does_it_actually_detect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:33:40.000Z</news:publication_date>
      <news:title>How MD5 hashing works and does it actually detect file changes. and can you still trust it today?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdmipk/teampcp_used_trivy_to_breach_cisco_the_eu/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:30:33.000Z</news:publication_date>
      <news:title>TeamPCP used Trivy to breach Cisco, the EU Commission, and 1,000+ orgs—IOCs inside, April 3 deadline just passed with no statement from Cisco</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:07:17.000Z</news:publication_date>
      <news:title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32868</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdlisb/the_attack_with_no_attacker_domain_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T01:45:04.000Z</news:publication_date>
      <news:title>The Attack With No Attacker Domain: Microsoft Entra B2B Guest Invitation Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdjzyp/bi_developer_here_should_i_pivot_to_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:35:55.000Z</news:publication_date>
      <news:title>BI Developer here… should I pivot to AI, cybersecurity, or something else?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdj7y0/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:30.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdi3vt/why_isnt_pgp_used_more_often_with_email_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T23:11:31.000Z</news:publication_date>
      <news:title>Why isn't PGP used more often with email security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/podcast/2026/04/killer-robots-are-here-now-what-lock-and-code-s07e07</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T23:10:20.000Z</news:publication_date>
      <news:title>Killer robots are here. Now what? (Lock and Code S07E07)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdh7fr/i_have_16_hours_of_mostly_free_time_whats_a_skill/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T22:33:05.000Z</news:publication_date>
      <news:title>I have 16 hours of mostly free time. What’s a skill I should learn? Mostly for fun</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdgj6n/cyber_security_freelancers_smaller_nontech/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T22:04:38.000Z</news:publication_date>
      <news:title>Cyber Security Freelancers - smaller non-tech companies?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdg874/anyone_have_blackwin_v4_iso_i_wanna_try_it_out/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:52:02.000Z</news:publication_date>
      <news:title>Anyone have blackwin v4 iso I wanna try it out but the pads is under maintenance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdg5g1/i_have_to_choose_my_ug_program_i_want_to_choose/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:48:55.000Z</news:publication_date>
      <news:title>I have to choose my ug program i want to choose cyb sec over BS CS cz thats too general but i am hesitant that AI might replace it too?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdfgwo/what_sources_are_you_following_for_ai_agentic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:21:03.000Z</news:publication_date>
      <news:title>What sources are you following for AI / Agentic security news, writeups, etc?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdfddc/tools_at_work/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:17:02.000Z</news:publication_date>
      <news:title>Tools at work</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdf8mw/any_good_newslettersblogs_on_infosec/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:11:44.000Z</news:publication_date>
      <news:title>Any good newsletters/blogs on infosec?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdd6l8/cysa_renewal_question/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:49:57.000Z</news:publication_date>
      <news:title>CySA+ renewal question</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:44:10.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdck5c/fake_claude_code_source_downloads_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:25:03.000Z</news:publication_date>
      <news:title>Fake Claude Code source downloads actually delivered malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdcamw/for_my_security_compliance_folks_and_individuals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:14:34.000Z</news:publication_date>
      <news:title>For my security compliance folks and individuals creating response documentation, what tools or templates do you use? Im trying "responseprep" at the moment. It makes the initial work so much easier for final edits. With all the new shiny tools out there, who's using what or are you hand writing?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:45:17.000Z</news:publication_date>
      <news:title>New FortiClient EMS flaw exploited in attacks, emergency patch released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/285-million-drift-hack-traced-to-six.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:25:00.000Z</news:publication_date>
      <news:title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdas5w/linux_70rc7_adding_more_documentation_for_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:15:44.000Z</news:publication_date>
      <news:title>Linux 7.0-rc7 adding more documentation for AI tools to send better security bug reports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sda9ce/a_deeper_look_at_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:55:41.000Z</news:publication_date>
      <news:title>A Deeper Look at RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sda8qp/reverse_engineering_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:54:59.000Z</news:publication_date>
      <news:title>Reverse Engineering RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd9uaa/quieres_aprender_a_cazar_amenazas_en_la_dark_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:39:31.000Z</news:publication_date>
      <news:title>🔥 ¿Quieres aprender a cazar amenazas en la Dark Web? La próxima semana iniciamos el curso de Dark Cyber Threat Intelligence. Te llevamos de lo básico a lo avanzado: investigación en foros oscuros, análisis de malware underground y mucho más. 👉 Obtén un 60% de descuento usando el cupón WILLIE60</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8mc1/cyber_awareness_jeff_3d_figure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:51:57.000Z</news:publication_date>
      <news:title>Cyber Awareness Jeff 3D Figure!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8a5e/is_ai_making_cybersecurity_stronger_or_just/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:38:35.000Z</news:publication_date>
      <news:title>Is AI making cybersecurity stronger or just supercharging hackers too?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd7rtm/anthropic_ran_an_ai_bug_bounty_on_open_source_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:18:37.000Z</news:publication_date>
      <news:title>Anthropic ran an AI bug bounty on open source for a month. It found 500+ zero-days.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd7hzh/gddrhammer_and_geforge_gddr6_gpu_rowhammer_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:08:04.000Z</news:publication_date>
      <news:title>GDDRHammer and GeForge: GDDR6 GPU Rowhammer to root shell (IEEE S&amp;P 2026, exploit code available)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd720i/is_cybersecurity_still_at_its_core_a_human_problem/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:41.000Z</news:publication_date>
      <news:title>Is cybersecurity still, at its core, a human problem?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd71k6/your_email_gateway_has_a_blind_spot_apts_already/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:11.000Z</news:publication_date>
      <news:title>Your Email Gateway Has a Blind Spot. APTs Already Know About It.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd6is7/syd_doing_a_full_exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:29:14.000Z</news:publication_date>
      <news:title>syd doing a full exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-react2shell-in-automated-credential-theft-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T14:17:23.000Z</news:publication_date>
      <news:title>Hackers exploit React2Shell in automated credential theft campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd30zy/certified_network_security_practitioner_cnsp/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T13:00:30.000Z</news:publication_date>
      <news:title>Certified Network Security Practitioner (CNSP) Study Materials?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd2vtq/anyone_interested_in_offline_ctf_event_in_india/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:53:30.000Z</news:publication_date>
      <news:title>Anyone interested in Offline ctf event in india ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1wh3/built_a_tool_to_stop_the_pain_of_manual_evtx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:04:57.000Z</news:publication_date>
      <news:title>Built a tool to stop the pain of manual EVTX triage</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1cgd/can_you_guys_me_suggestions_should_i_do_bca_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:34:43.000Z</news:publication_date>
      <news:title>Can you guys me suggestions, should i do BCA in Cyber Security or something else to get into CS field ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0tzy/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:05:25.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0qbj/deployed_goadlight_on_virtualbox_ubuntu_2404/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:57.000Z</news:publication_date>
      <news:title>Deployed GOAD-Light on VirtualBox (Ubuntu 24.04) - sharing my guide with the real errors I hit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd0q71/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:45.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0nzk/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:56:03.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0667/soc_analyst_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:25:46.000Z</news:publication_date>
      <news:title>SOC Analyst 1</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:00:00.000Z</news:publication_date>
      <news:title>The Hack That Exposed Syria’s Sweeping Security Failures</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scyj3y/feeling_stuck_and_looking_for_honest_advice_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:41:38.000Z</news:publication_date>
      <news:title>feeling stuck and looking for honest advice on whats next</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scy246/about_to_take_ejpt_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:11:26.000Z</news:publication_date>
      <news:title>About to take eJPT. help..</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scxx6w/cyber_crimes_attempt_preperation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:02:50.000Z</news:publication_date>
      <news:title>Cyber crimes &amp; attempt - preperation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:00:49.000Z</news:publication_date>
      <news:title>Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1scx6s9/database_of_malicious_chromeedge_extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:17:46.000Z</news:publication_date>
      <news:title>Database of malicious Chrome/Edge extensions - auto-updated daily</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/rising-breach-costs-and-operational-downtime-redefine-economics-of-ot-cybersecurity-making-it-boardroom-priority/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:55:32.000Z</news:publication_date>
      <news:title>Rising breach costs and operational downtime redefine economics of OT cybersecurity making it boardroom priority</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwnd9/the_visible_key_a_new_way_to_verify_source/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:45:42.000Z</news:publication_date>
      <news:title>The Visible Key — A New Way to Verify Source</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwfwe/are_companies_pushing_the_good_guys_to_go_rogue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:33:08.000Z</news:publication_date>
      <news:title>Are companies pushing the good guys to go rogue?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T05:07:00.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T04:32:00.000Z</news:publication_date>
      <news:title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct8hp/do_you_guys_think_risk_based_alerting_is_dead_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:38:21.000Z</news:publication_date>
      <news:title>Do you guys think Risk Based Alerting is dead in water with the AI landscape.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct022/i_created_a_small_lab_demo_showing_how_responder/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:26:18.000Z</news:publication_date>
      <news:title>I created a small lab demo showing how #Responder can capture NTLM hashes over a local network.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsq79/which_cyber_roles_are_truly_aiproof/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:12:41.000Z</news:publication_date>
      <news:title>Which cyber roles are truly "AI-proof"?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsguv/linkedin_is_spying_on_you_according_to_a_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:00:11.000Z</news:publication_date>
      <news:title>LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scpul1/offering_free_help_with_penetration_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:51:52.000Z</news:publication_date>
      <news:title>Offering Free Help with Penetration Testing Projects (Looking to Build Experience)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scphzz/after_the_mercor_breach_i_built_a_local_secret/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:35:24.000Z</news:publication_date>
      <news:title>After the Mercor breach, I built a local secret scanner for AI-generated code</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scojim/uk_about_to_be_over_employed_have_i_ruined_future/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T23:50:23.000Z</news:publication_date>
      <news:title>UK -About to be over employed - have I ruined future chances at obtaining SC?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scmq9l/website_provider_gave_client_an_spf_include_to_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:29:52.000Z</news:publication_date>
      <news:title>Website provider gave client an SPF include to a domain they did not control, and it was set to +all</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scm5bc/fortinet_cve202635616_actively_exploited_as_zero/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:04:19.000Z</news:publication_date>
      <news:title>Fortinet CVE-2026-35616 Actively Exploited as Zero Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sclo8j/how_i_stole_aes_keys_from_a_microcontroller_using/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:44:25.000Z</news:publication_date>
      <news:title>How I stole AES keys from a microcontroller using power analysis (ChipWhisperer walkthrough)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sckmlw/i_have_refactored_slurp_s3_bucket_enumerator_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:01:45.000Z</news:publication_date>
      <news:title>I have refactored slurp s3 bucket enumerator to work with any s3 compatible cloud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck5t9/5_yoe_appsec_at_faang_microsoft_what_is_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:43:02.000Z</news:publication_date>
      <news:title>5 YOE AppSec at FAANG (Microsoft). What is the market like for mid career candidates?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck4e3/cisco_patched_a_9810_cve_yesterday_authentication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:41:34.000Z</news:publication_date>
      <news:title>Cisco patched a 9.8/10 CVE yesterday — authentication bypass on IMC that gives full admin access with one HTTP request, no credentials needed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:30:42.000Z</news:publication_date>
      <news:title>Axios npm hack used fake Teams error fix to hijack maintainer account</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scg2ml/open_source_tool_for_supply_chain_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T18:01:15.000Z</news:publication_date>
      <news:title>Open source tool for supply chain malware detection: CTWall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sce4um/how_good_is_recruitment_in_this_space/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:46:46.000Z</news:publication_date>
      <news:title>How good is recruitment in this space</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scczit/where_to_start_in_reverse_engineering_as_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:01:54.000Z</news:publication_date>
      <news:title>Where to start in reverse engineering as an absolutely beginner with no knowledge whatsoever? Ghidra perhaps or something else</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sccnjb/browsergate_linkedinmicrosoft_allegedly_scans/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:48:42.000Z</news:publication_date>
      <news:title>BrowserGate: LinkedIn/Microsoft allegedly scans 6,000+ browser extensions &amp; links them to real identities, all without user consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbniy/burp_suite/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:08:37.000Z</news:publication_date>
      <news:title>Burp Suite</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbc8y/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:56:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb95s/browsergate_report_alleges_linkedin_is_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:52:51.000Z</news:publication_date>
      <news:title>BrowserGate: Report alleges LinkedIn is scanning 6,000+ browser extensions without consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb86j/what_can_be_done_with_an_ip_address/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:51:45.000Z</news:publication_date>
      <news:title>what can be done with an ip address</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1scak6p/apples_spotlight_search_results_come_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:24:13.000Z</news:publication_date>
      <news:title>Apple's Spotlight Search Results Come With Engagement Metrics. No One Knew.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:17:38.000Z</news:publication_date>
      <news:title>Device code phishing attacks surge 37x as new kits spread online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:09:54.000Z</news:publication_date>
      <news:title>FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sc7s4w/pcmag_hackers_are_using_claude_code_leak_as_bait/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T12:18:17.000Z</news:publication_date>
      <news:title>PCMag: Hackers Are Using Claude Code Leak As Bait to Spread Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc5xhj/researchers_uncover_mining_operation_using_iso/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:37:24.000Z</news:publication_date>
      <news:title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:31:00.000Z</news:publication_date>
      <news:title>European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:30:00.000Z</news:publication_date>
      <news:title>Hackers Are Posting the Claude Code Leak With Bonus Malware</news:title>
    </news:news>
  </url>
</urlset>