<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scg2ml/open_source_tool_for_supply_chain_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T18:01:15.000Z</news:publication_date>
      <news:title>Open source tool for supply chain malware detection: CTWall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sce4um/how_good_is_recruitment_in_this_space/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:46:46.000Z</news:publication_date>
      <news:title>How good is recruitment in this space</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scczit/where_to_start_in_reverse_engineering_as_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:01:54.000Z</news:publication_date>
      <news:title>Where to start in reverse engineering as an absolutely beginner with no knowledge whatsoever? Ghidra perhaps or something else</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sccnjb/browsergate_linkedinmicrosoft_allegedly_scans/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:48:42.000Z</news:publication_date>
      <news:title>BrowserGate: LinkedIn/Microsoft allegedly scans 6,000+ browser extensions &amp; links them to real identities, all without user consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbniy/burp_suite/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:08:37.000Z</news:publication_date>
      <news:title>Burp Suite</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbc8y/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:56:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb95s/browsergate_report_alleges_linkedin_is_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:52:51.000Z</news:publication_date>
      <news:title>BrowserGate: Report alleges LinkedIn is scanning 6,000+ browser extensions without consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb86j/what_can_be_done_with_an_ip_address/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:51:45.000Z</news:publication_date>
      <news:title>what can be done with an ip address</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1scak6p/apples_spotlight_search_results_come_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:24:13.000Z</news:publication_date>
      <news:title>Apple's Spotlight Search Results Come With Engagement Metrics. No One Knew.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:17:38.000Z</news:publication_date>
      <news:title>Device code phishing attacks surge 37x as new kits spread online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:09:54.000Z</news:publication_date>
      <news:title>FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sc7s4w/pcmag_hackers_are_using_claude_code_leak_as_bait/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T12:18:17.000Z</news:publication_date>
      <news:title>PCMag: Hackers Are Using Claude Code Leak As Bait to Spread Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc5xhj/researchers_uncover_mining_operation_using_iso/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:37:24.000Z</news:publication_date>
      <news:title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:31:00.000Z</news:publication_date>
      <news:title>European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:30:00.000Z</news:publication_date>
      <news:title>Hackers Are Posting the Claude Code Leak With Bonus Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc5et2/more_than_600_cyber_tools_and_resources/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:06:01.000Z</news:publication_date>
      <news:title>More than 600 cyber tools and resources</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4v8z/teampcp_supply_chain_attacks_claim_first_named/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:32:23.000Z</news:publication_date>
      <news:title>TeamPCP supply chain attacks claim first named victims as EC breach traced to Trivy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4h5p/eli5_email_man_in_the_middle/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:08:04.000Z</news:publication_date>
      <news:title>Eli5 email man in the middle</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc46lz/slopsquatscan_cli_tool_that_checks_slopsquatted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:49:53.000Z</news:publication_date>
      <news:title>SlopSquatScan - CLI tool that checks slopsquatted packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc3fju/proofofpersonhood_without_biometrics_the_irlid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:03:07.000Z</news:publication_date>
      <news:title>Proof-of-Personhood Without Biometrics: The IRLid Protocol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc32mz/flood_in_italy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T07:41:38.000Z</news:publication_date>
      <news:title>Flood in Italy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwgy7/how_long_does_it_actually_take_your_team_to_fill/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:51:46.000Z</news:publication_date>
      <news:title>How long does it actually take your team to fill out a vendor security questionnaire?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaru/ciberseguridad_oferta_de_empleo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:44.000Z</news:publication_date>
      <news:title>Ciberseguridad oferta de empleo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaq4/npm_isntall_i_svrnsecshield/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:40.000Z</news:publication_date>
      <news:title>npm isntall -I @Svrnsec/Shield</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/elastic-security-integrations-roundup-q1-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T00:00:00.000Z</news:publication_date>
      <news:title>Elastic Security Integrations Roundup: Q1 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbti2s/shieldnet_trust_posture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:37:12.000Z</news:publication_date>
      <news:title>ShieldNet Trust Posture</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtetw/gslc_value/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:33:16.000Z</news:publication_date>
      <news:title>GSLC value?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtegn/how_to_start_study_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:32:50.000Z</news:publication_date>
      <news:title>How to start study cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbt0xz/hr_reviewing_my_interview_am_i_close_to_an_offer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:16:32.000Z</news:publication_date>
      <news:title>HR reviewing my interview — am I close to an offer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/that-dream-job-offer-from-coca-cola-or-ferrari-its-a-trap-for-your-passwords</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:13:58.000Z</news:publication_date>
      <news:title>That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsoz8/how_to_pivot_into_ot/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:02:27.000Z</news:publication_date>
      <news:title>How to pivot into OT?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsohg/architecture_review_preventing_shadow_ai_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:01:49.000Z</news:publication_date>
      <news:title>Architecture Review: Preventing "Shadow AI" data leaks with a stateless PII firewall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:38.000Z</news:publication_date>
      <news:title>When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbr7kq/openais_gpt54_got_blocked_by_safety_mechanisms_5/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:23.000Z</news:publication_date>
      <news:title>OpenAI's GPT-5.4 got blocked by safety mechanisms 5 times, searched my machine for tools to bypass them, launched Claude Opus with dangerously bypass permissions flags, tried to COVER UP what he had done, then gave me a "perfect" apology when caught</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbqnv6/chinalinked_ta416_targets_european_governments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:38:26.000Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:28:14.000Z</news:publication_date>
      <news:title>Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/data-privacy/inconsistent-privacy-labels-not-enough</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:05:07.000Z</news:publication_date>
      <news:title>Inconsistent Privacy Labels Don't Tell Users What They Are Getting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbpkx6/for_eu_companies_is_zero_data_liability_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:56:33.000Z</news:publication_date>
      <news:title>For EU companies' Is "Zero Data Liability" actually a budget priority?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:40:22.000Z</news:publication_date>
      <news:title>LinkedIn secretly scans for 6,000+ Chrome extensions, collects data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/linkedin-secretely-scans-for-6-000-plus-chrome-extensions-collects-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:40:22.000Z</news:publication_date>
      <news:title>LinkedIn secretely scans for 6,000+ Chrome extensions, collects data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fcc-proposes-5-million-fine-robocall</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:12:00.000Z</news:publication_date>
      <news:title>FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/trueconf-cyberattack-cisa-hackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:45:00.000Z</news:publication_date>
      <news:title>CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbn3w3/what_if_hsms_were_as_easy_to_use_as_they_are/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:22:56.000Z</news:publication_date>
      <news:title>What If HSMs Were as Easy to Use as They Are Powerful? A native macOS app for YubiHSM 2 management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/the-developer-credential-economy-exposure-data-is-the-new-front-line-in-the-supply-chain-war</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:50:57.000Z</news:publication_date>
      <news:title>The developer credential economy: Why exposure data is the new front line in the supply chain war</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbm7me/the_axios_supply_chain_attack_used_individually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:49:58.000Z</news:publication_date>
      <news:title>The Axios supply chain attack used individually targeted social engineering</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sblspg/i_accidently_let_my_sans_cert_expire_so_i_built_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:34:33.000Z</news:publication_date>
      <news:title>I accidently let my SANS cert expire so I built a tool to track team cert expiry</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sblpgx/hiring_from_a_director_of_cybers_perspective/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:13.000Z</news:publication_date>
      <news:title>Hiring from a director of cyber's perspective.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/european-commission-cyberattack-teampcp</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:15:00.000Z</news:publication_date>
      <news:title>EU cyber agency attributes major data breach to TeamPCP hacking group</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbktww/someone_is_actively_publishing_malicious_packages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:59:26.000Z</news:publication_date>
      <news:title>Someone is actively publishing malicious packages targeting the Strapi plugin ecosystem right now</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbkn6q/is_pki_a_good_longterm_career_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:52:34.000Z</news:publication_date>
      <news:title>Is PKI a good long-term career in cybersecurity? (Scope, salaries, future with AI)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hims-and-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:41:11.000Z</news:publication_date>
      <news:title>Hims &amp; Hers warns of data breach after Zendesk support ticket breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:34:00.000Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbk0ep/seeking_arxiv_endorsement_for_cscr/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:29:24.000Z</news:publication_date>
      <news:title>Seeking Arxiv Endorsement for cs.CR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbjppf/has_anybody_used_zip_security_and_now_what_their/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:18:41.000Z</news:publication_date>
      <news:title>Has anybody used Zip Security and now what their pricing is?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/apple-patches-darksword-ios-18</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:08:57.000Z</news:publication_date>
      <news:title>Apple Breaks Precedent, Patches DarkSword for iOS 18</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbj51g/relearning_pythonbashpowershell/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:58:07.000Z</news:publication_date>
      <news:title>Relearning Python/Bash/Powershell</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbj2o6/how_false_are_false_positives_moving_from_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:55:47.000Z</news:publication_date>
      <news:title>How "false" are false positives? Moving from a Hunter to an Architect mindset.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbimd3/bots_v2_questions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:39:10.000Z</news:publication_date>
      <news:title>BOTS v2 QUESTIONS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:36:44.000Z</news:publication_date>
      <news:title>Die Linke German political party confirms data stolen by Qilin ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:33:14.000Z</news:publication_date>
      <news:title>Trump budget proposal would cut hundreds of millions more from CISA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/wyden-warns-ssa-chief-trump-voter-database-blatant-voter-suppression/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:30:24.000Z</news:publication_date>
      <news:title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbhdtm/i_just_experienced_my_first_fullblown_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:53:11.000Z</news:publication_date>
      <news:title>I just experienced my first full-blown malware incident as an IT person</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbgxd2/infostealers_ulp_urlloginpassword_data_is_burning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:36:12.000Z</news:publication_date>
      <news:title>Infostealers ULP (url:login:password) Data Is Burning Out SOC Teams and Killing Automation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:32:00.000Z</news:publication_date>
      <news:title>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/teampcp-attacks-hacker-infighting</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:11:16.000Z</news:publication_date>
      <news:title>Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbg683/mssp_recommendations_for_horizon3ai_in_smallscale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:08:09.000Z</news:publication_date>
      <news:title>MSSP recommendations for Horizon3.ai in small-scale, dynamic environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbfq4u/claude_code_found_a_linux_vulnerability_hidden/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:51:20.000Z</news:publication_date>
      <news:title>Claude Code Found a Linux Vulnerability Hidden for 23 Years</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbfil2/npmsentinel_21_malicious_npm_packages_in_24h/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:43:18.000Z</news:publication_date>
      <news:title>npm-sentinel: 21 malicious npm packages in 24h including LLM API MITM, encrypted skill backdoors, and Redis weaponization via postinstall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfg2m/21_malicious_npm_packages_found_in_24_hours_4/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:40:30.000Z</news:publication_date>
      <news:title>21 malicious npm packages found in 24 hours: 4 novel attack vectors targeting AI coding assistants including LLM API MITM and encrypted skill backdoors</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/blocking-children-from-social-media-is-a-badly-executed-good-idea</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:37:52.000Z</news:publication_date>
      <news:title>Blocking children from social media is a badly executed good idea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfcxj/new_rowhammer_attacks_give_complete_control_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:37:05.000Z</news:publication_date>
      <news:title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfcrd/i_feel_behind/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:36:53.000Z</news:publication_date>
      <news:title>I feel behind</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:05:15.000Z</news:publication_date>
      <news:title>Evolution of Ransomware: Multi-Extortion Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbehds/is_this_a_good_roadmap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:02:55.000Z</news:publication_date>
      <news:title>Is this a good roadmap?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/massachusetts-emergency-alert-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:00:00.000Z</news:publication_date>
      <news:title>Massachusetts emergency communications system impacted by cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbe9tn/using_undocumented_aws_codebuild_endpoints_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:54:42.000Z</news:publication_date>
      <news:title>Using undocumented AWS CodeBuild endpoints to extract privileged tokens from AWS CodeConnections allowing lateral movement and privilege escalation through an organisation's codebase</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbdtyi/if_youre_running_openclaw_you_probably_got_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:36:49.000Z</news:publication_date>
      <news:title>If you're running OpenClaw, you probably got hacked in the last week</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbds9i/if_youre_running_openclaw_you_probably_got_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:34:55.000Z</news:publication_date>
      <news:title>If you're running OpenClaw, you probably got hacked in the last week</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/remote-workforce/skull-vibrations-could-be-xr-headset-authentication</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:30:00.000Z</news:publication_date>
      <news:title>Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ukraine-warns-russian-hackers-revisiting-old-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:20:00.000Z</news:publication_date>
      <news:title>Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32864</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:18:01.000Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000&amp;#x2b; SaaS Environments, (Fri, Apr 3rd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:00:00.000Z</news:publication_date>
      <news:title>Source Code Leaks Highlight Lack of Supply Chain Oversight</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-14-6/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:00:00.000Z</news:publication_date>
      <news:title>The Good, the Bad and the Ugly in Cybersecurity – Week 14</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:59:22.000Z</news:publication_date>
      <news:title>Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:57:28.000Z</news:publication_date>
      <news:title>Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbcny3/man_admits_to_locking_thousands_of_windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:48:03.000Z</news:publication_date>
      <news:title>Man admits to locking thousands of Windows devices in extortion plot</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trueconf-zero-day-exploited-in-asian-government-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:47:16.000Z</news:publication_date>
      <news:title>TrueConf Zero-Day Exploited in Asian Government Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbclqe/characterizing_abusive_ip_proxies/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:45:18.000Z</news:publication_date>
      <news:title>Characterizing Abusive IP Proxies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:30:53.000Z</news:publication_date>
      <news:title>In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/critical-sharefile-flaws-lead-to-unauthenticated-rce/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:12:22.000Z</news:publication_date>
      <news:title>Critical ShareFile Flaws Lead to Unauthenticated RCE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbbpb3/how_to_structure_pcaps/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:04:20.000Z</news:publication_date>
      <news:title>How to structure PCAPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/crowdstrike-falcon-ingest-microsoft-defender-telemetry</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:53:15.000Z</news:publication_date>
      <news:title>CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbbefe/what_16_security_engines_found_in_2900_mcp_servers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:50:02.000Z</news:publication_date>
      <news:title>What 16 security engines found in 2,900 MCP servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/windows-secure-boot-certificate-update-2026-expiration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:43:26.000Z</news:publication_date>
      <news:title>Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbb7o3/agent_armor_open_source_zero_trust_runtime_for_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:40:53.000Z</news:publication_date>
      <news:title>Agent Armor: open source zero trust runtime for AI agents — protocol DPI, taint tracking, policy verification (Rust</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbb5k7/claude_code_leak_exploit_researchers_found_3/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:37:58.000Z</news:publication_date>
      <news:title>Claude Code Leak -&gt; Exploit? Researchers found 3 shell injection bugs in the leaked source — all using shell:true with unsanitized input</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbb4u0/anthropic_leak_reveals_cybersecurity_danger_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:36:55.000Z</news:publication_date>
      <news:title>Anthropic leak reveals cybersecurity danger and potential of new model</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-still-working-to-fix-exchange-online-mailbox-access-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:25:20.000Z</news:publication_date>
      <news:title>Microsoft still working to fix Exchange Online mailbox access issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbasol/microsofts_newest_opensource_project_runtime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:19:18.000Z</news:publication_date>
      <news:title>Microsoft's newest open-source project: Runtime security for AI agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:04:00.000Z</news:publication_date>
      <news:title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbah89/crtp_results/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:02:26.000Z</news:publication_date>
      <news:title>CRTP results</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/mobile-attack-surface-expands-as-enterprises-lose-control/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:00:00.000Z</news:publication_date>
      <news:title>Mobile Attack Surface Expands as Enterprises Lose Control</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:00:00.000Z</news:publication_date>
      <news:title>Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/react2shell-exploited-in-large-scale-credential-harvesting-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:55:13.000Z</news:publication_date>
      <news:title>React2Shell Exploited in Large-Scale Credential Harvesting Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/claude-code-leak-github-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:54:38.000Z</news:publication_date>
      <news:title>Claude Code source leak exploited to spread malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sba0kh/what_signals_tell_you_that_a_process_is_about_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:37:36.000Z</news:publication_date>
      <news:title>What signals tell you that a process is “about to break” even if it hasn’t yet?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/t-mobile-sets-the-record-straight-on-latest-data-breach-filing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:30:00.000Z</news:publication_date>
      <news:title>T-Mobile Sets the Record Straight on Latest Data Breach Filing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb9e56/apple_expands_updates_to_ios_18_devices_affected/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:02:09.000Z</news:publication_date>
      <news:title>Apple expands updates to iOS 18 devices affected by DarkSword exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb9amr/trivy_supply_chain_attack_teampcp_cicd_trust/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:56:51.000Z</news:publication_date>
      <news:title>Trivy Supply Chain Attack (TeamPCP) — CI/CD Trust Abuse, Tag Poisoning, and Credential Theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/north-korean-hackers-drain-285-million-from-drift-in-10-seconds/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:46:06.000Z</news:publication_date>
      <news:title>North Korean Hackers Drain $285 Million From Drift in 10 Seconds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:10:00.000Z</news:publication_date>
      <news:title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/man-admits-to-extortion-plot-locking-coworkers-out-of-thousands-of-windows-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:04:54.000Z</news:publication_date>
      <news:title>Man admits to locking thousands of Windows devices in extortion plot</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:00:00.000Z</news:publication_date>
      <news:title>CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:35:00.000Z</news:publication_date>
      <news:title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sb7pr4/new_rce_in_control_web_panel_cve202570951/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:20:58.000Z</news:publication_date>
      <news:title>New RCE in Control Web Panel (CVE-2025-70951)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sb7man/a_threat_actor_who_goes_by_the_name_mr_raccoon/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:14:57.000Z</news:publication_date>
      <news:title>A threat actor who goes by the name "Mr. Raccoon" has claimed to hack Adobe support via 3rd party Indian BPO firm</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:00:00.000Z</news:publication_date>
      <news:title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-now-force-upgrades-unmanaged-windows-11-24h2-pcs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:55:40.000Z</news:publication_date>
      <news:title>Microsoft now force upgrades unmanaged Windows 11 24H2 PCs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/aperion-smartflow-sdk-ai-governance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:06:01.000Z</news:publication_date>
      <news:title>APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/european-commission-cloud-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T06:34:00.000Z</news:publication_date>
      <news:title>Trivy supply chain attack enabled European Commission cloud breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T06:33:34.000Z</news:publication_date>
      <news:title>CERT-EU: European Commission hack exposes data of 30 EU entities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb58if/timeline_inconsistencies_in_strategy_review_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:52:12.000Z</news:publication_date>
      <news:title>Timeline inconsistencies in strategy review data and issues of data reliability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb54kp/does_anyone_here_work_as_a_security_engineer_at/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:46:05.000Z</news:publication_date>
      <news:title>Does anyone here work as a security engineer at google India ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/microsoft-ai-agent-governance-toolkit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:30:38.000Z</news:publication_date>
      <news:title>Microsoft releases open-source toolkit to govern autonomous AI agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/android-permissions-privacy-risks-research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:00:19.000Z</news:publication_date>
      <news:title>Which messaging app takes the most limited approach to permissions on Android?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb45bw/first_analysis_detection_pack_for_the_claude_code/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:52:09.000Z</news:publication_date>
      <news:title>First analysis &amp; detection pack for the Claude Code source leak</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb42qh/adobe_data_breach_2026_via_indian_bpo_support/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:48:18.000Z</news:publication_date>
      <news:title>Adobe Data Breach 2026 via Indian BPO support firm by "Mr. Raccoon"</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/thales-digital-trust-trends-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:30:22.000Z</news:publication_date>
      <news:title>Click, wait, repeat: Digital trust erodes one login at a time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/new-infosec-products-of-the-month-march-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:00:58.000Z</news:publication_date>
      <news:title>New infosec products of the month: March 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb1o5p/why_are_graphics_drivers_exempted_from_codeql/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:48:04.000Z</news:publication_date>
      <news:title>Why are graphics drivers exempted from CodeQL?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb1cgb/cnssi_and_jsig_rmf_training/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:32:30.000Z</news:publication_date>
      <news:title>CNSSI and JSIG RMF training?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sb15mr/georgia_tech_or_rit_for_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:23:41.000Z</news:publication_date>
      <news:title>Georgia Tech or RIT for cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32862</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sazvie/built_an_offline_ai_pentest_assistant_in_python/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T01:24:32.000Z</news:publication_date>
      <news:title>Built an offline AI pentest assistant in Python — local LLM analyzes nmap/whois results and saves findings to MariaDB</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saxz7s/potential_technical_sr_cybersecurity_advisor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:58:58.000Z</news:publication_date>
      <news:title>Potential Technical SR. Cybersecurity Advisor interview tommorow any tips? things to go over?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1saxmi2/sophisticated_crystalx_rat_emerges_it_is_written/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:43:23.000Z</news:publication_date>
      <news:title>Sophisticated CrystalX RAT Emerges - It Is Written in Go</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saxg40/malicious_compliance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:35:36.000Z</news:publication_date>
      <news:title>Malicious Compliance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1saxf2r/philosophical_question_best_way_to_handle/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:34:25.000Z</news:publication_date>
      <news:title>Philosophical Question: Best Way to Handle Phishing on Shared Email? One or the other.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1saxedk/detailed_analysis_of_a_sophisticated_firefox/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:33:35.000Z</news:publication_date>
      <news:title>Detailed analysis of a sophisticated firefox extension malware found in the wild using browser-xpi-malware-scanner.py</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sax2x7/leapstackvn_data_breach_approximately_100_gb_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:19:44.000Z</news:publication_date>
      <news:title>leapstack.vn: Data Breach Approximately 100 GB of health insurance claims accidentally exposed on an unprotected server | by chum1ng0 | Apr, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/backblaze-cloud-storage-benchmark-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T22:15:02.000Z</news:publication_date>
      <news:title>AWS, Wasabi, Cloudflare, and Backblaze go head-to-head in new cloud storage test</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sauzwt/dealing_with_a_rat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:54:29.000Z</news:publication_date>
      <news:title>dealing with a RAT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/geopolitics-ai-cybersecurity-insights-rsac-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:14:27.000Z</news:publication_date>
      <news:title>Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/uncanny-valley-podcast-iran-targets-us-tech-polymarket-pop-up-trump-midterms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:04:22.000Z</news:publication_date>
      <news:title>‘Uncanny Valley’: Iran’s Threats on US Tech, Trump’s Plans for Midterms, and Polymarket’s Pop-up Flop</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1satohk/built_a_browserbased_experiment_that_turns_files/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:03:25.000Z</news:publication_date>
      <news:title>Built a browser-based experiment that turns files into a deterministic “sonic fingerprint”</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ice-using-paragon-spyware-house-democrats-letter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:02:02.000Z</news:publication_date>
      <news:title>House Dems decry confirmed ICE usage of Paragon spyware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:30:55.000Z</news:publication_date>
      <news:title>Claude Code leak used to push infostealer malware on GitHub</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/toying-around-hasbro-attack-remediate</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:28:36.000Z</news:publication_date>
      <news:title>Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate</news:title>
    </news:news>
  </url>
</urlset>