<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://therecord.media/big-tech-fails-to-opt-out-users-requesting-not-to-be-tracked</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T00:44:00.000Z</news:publication_date>
      <news:title>Big tech fails to opt-out users requesting not to be tracked much of the time, new research says</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1smd2tu/feeling_left_behind_untechnical/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T17:37:57.000Z</news:publication_date>
      <news:title>Feeling left behind untechnical</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1smcn94/ethical_hacking_cybersecurity_how_do_i_make/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T17:22:51.000Z</news:publication_date>
      <news:title>Ethical hacking Cybersecurity. How do I make friends along the way?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/n8n-webhooks-abused-since-october-2025.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T17:09:00.000Z</news:publication_date>
      <news:title>n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/sweden-blames-pro-russian-group-for-cyberattack-last-year-on-its-energy-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:46:48.000Z</news:publication_date>
      <news:title>Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1smbaos/for_those_of_you_that_have_found_cves_do_you_feel/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:35:58.000Z</news:publication_date>
      <news:title>For those of you that have found CVE's do you feel recognized?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-pays-23-million-for-cloud-and-ai-flaws-at-zero-day-quest/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:20:21.000Z</news:publication_date>
      <news:title>Microsoft pays $2.3M for cloud and AI flaws at Zero Day Quest</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/15/incident-response-for-ai-same-fire-different-fuel/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:00:45.000Z</news:publication_date>
      <news:title>Incident response for AI: Same fire, different fuel</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/openai-unveils-gpt-54-cyber-defense/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:00:00.000Z</news:publication_date>
      <news:title>OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/anthropic-mythos-uk-cyber-risk</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:00:00.000Z</news:publication_date>
      <news:title>UK warns businesses to address cyber risks amid Anthropic AI panic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sma6yz/crypto_faces_increased_threat_from_quantum_attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:57:35.000Z</news:publication_date>
      <news:title>Crypto Faces Increased Threat from Quantum Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/enisa-europe-seeks-top-level-root/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:31:00.000Z</news:publication_date>
      <news:title>European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm98vw/demonstrating_context_injection_oversharing_in_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:24:07.000Z</news:publication_date>
      <news:title>Demonstrating Context Injection &amp; Over-Sharing in AI Agents (with Lab + Analysis)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm95a2/avanan_checkpoint_issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:20:29.000Z</news:publication_date>
      <news:title>Avanan Checkpoint Issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/preparing-q-day-quantum-risk-management</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:12:01.000Z</news:publication_date>
      <news:title>Prepping for 'Q-Day': Why Quantum Risk Management Should Start Now</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm8sde/ibm_warns_aipowered_hackers_are_coming_so_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:07:54.000Z</news:publication_date>
      <news:title>IBM warns AI-powered hackers are coming, so it built AI to fight them</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-flags-windows-task-host-vulnerability-as-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:51:05.000Z</news:publication_date>
      <news:title>CISA flags Windows Task Host vulnerability as exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm8b0b/black_bastalinked_attacks_target_executives_via/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:50:56.000Z</news:publication_date>
      <news:title>Black Basta-linked attacks target executives via Teams phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/exploited-vulnerability-exposes-nginx-servers-to-hacking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:45:58.000Z</news:publication_date>
      <news:title>Exploited Vulnerability Exposes Nginx Servers to Hacking</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/dragon-boss-adware-disables/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:40:00.000Z</news:publication_date>
      <news:title>Signed Adware Operation Disables Antivirus Across 23,000 Hosts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm7zkp/antimalware_question/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:39:25.000Z</news:publication_date>
      <news:title>Anti-malware question</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/audit-big-tech-ignores-data-collection-requests</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:38:53.000Z</news:publication_date>
      <news:title>Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm7sme/how_can_i_properly_securitycheck_an_aibuilt_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:32:00.000Z</news:publication_date>
      <news:title>How can I properly security-check an AI-built web platform if I’m not a developer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/mcgraw-hill-data-leak-tied-to-salesforce-misconfiguration</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:28:00.000Z</news:publication_date>
      <news:title>Educational company McGraw Hill says Salesforce misconfiguration led to data leak</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm708g/is_it_legal_to_publish_rev_shell_on_github/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:02:23.000Z</news:publication_date>
      <news:title>Is it legal to publish Rev Shell on GitHub?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm6yg5/engaging_vs_timesaving_training_whats_better/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:00:33.000Z</news:publication_date>
      <news:title>Engaging vs. time-saving training. What's better?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/rolling-networks-securing-the-transportation-sector/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:00:10.000Z</news:publication_date>
      <news:title>Rolling Networks: Securing the Transportation Sector</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/capsule-security-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:59:55.000Z</news:publication_date>
      <news:title>Capsule Security debuts with $7 million funding to secure AI agent behavior</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/openai-expands-trusted-access-for-cyber-to-thousands-for-cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:59:27.000Z</news:publication_date>
      <news:title>OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/capsule-security-emerges-from-stealth-with-7-million-in-funding/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:56:50.000Z</news:publication_date>
      <news:title>Capsule Security Emerges From Stealth With $7 Million in Funding</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm6m73/running_crowdstrike_and_defender_edr/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:47:29.000Z</news:publication_date>
      <news:title>Running Crowdstrike and Defender EDR simultaneously - worth it or redundant?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/broadcom-vmware-tanzu-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:44:37.000Z</news:publication_date>
      <news:title>Broadcom introduces zero-trust runtime for scalable AI agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/by-design-flaw-in-mcp-could-enable-widespread-ai-supply-chain-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:34:48.000Z</news:publication_date>
      <news:title>‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/bitdefender-gravityzone-extended-email-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:28:35.000Z</news:publication_date>
      <news:title>Bitdefender extends GravityZone with continuous email threat protection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm62ac/persistent_multilayer_compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:25:44.000Z</news:publication_date>
      <news:title>Persistent multi-layer compromise (devices/SIM/identity) — need help isolating root cause</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/100-chrome-extensions-steal-user-data-open-backdoor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:24:13.000Z</news:publication_date>
      <news:title>100 Chrome Extensions Steal User Data, Create Backdoor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/fake-youtube-copyright-notices-can-steal-your-google-login</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:21:25.000Z</news:publication_date>
      <news:title>Fake YouTube copyright notices can steal your Google login</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/tenable-ot-discovery-engine/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:14:17.000Z</news:publication_date>
      <news:title>Tenable unveils OT discovery engine to expose cyber-physical risks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sm5hi0/replacing_falco_with_an_embedded_ebpf_sensor_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:02:42.000Z</news:publication_date>
      <news:title>Replacing Falco with an embedded eBPF sensor for Kubernetes runtime enforcement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/webinar-the-it-leaders-guide-to-ai-governance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:00:36.000Z</news:publication_date>
      <news:title>Webinar: The IT Leader’s Guide to AI Governance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/nginx-ui-mcp-flaw-actively/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:00:00.000Z</news:publication_date>
      <news:title>Critical Nginx-ui MCP Flaw Actively Exploited in the Wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/ciso-conversations-ross-mckerchar-ciso-at-sophos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:00:00.000Z</news:publication_date>
      <news:title>CISO Conversations: Ross McKerchar, CISO at Sophos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:56:00.000Z</news:publication_date>
      <news:title>Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/ot-vulnerability-management-cyber-physical-systems-cybersecurity</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:50:00.000Z</news:publication_date>
      <news:title>Unlocking foundational visibility for cyber-physical systems with OT vulnerability management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/axonius-expands-asset-cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:42:16.000Z</news:publication_date>
      <news:title>Axonius updates Asset Cloud with AI, exposure management, and asset trust standard</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/april-patch-tuesday-fixes-critical.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:37:00.000Z</news:publication_date>
      <news:title>April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sm4dgi/what_can_potentially_happen_if_i_open_this/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:16:38.000Z</news:publication_date>
      <news:title>What can potentially happen if I open this</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm4cd4/build_a_secure_scalable_and_compliant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:15:21.000Z</news:publication_date>
      <news:title>Build a secure, scalable, and compliant infrastructure with experts you can trust.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/sweden-hackers-russia-power-plant</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:15:00.000Z</news:publication_date>
      <news:title>Sweden says pro-Russian hackers attempted to breach thermal power plant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/mirax-rat-targeting-android-users-in-europe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:10:08.000Z</news:publication_date>
      <news:title>Mirax RAT Targeting Android Users in Europe</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm41rz/best_ai_soc_platforms_2026_i_am_not_convinced/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:02:26.000Z</news:publication_date>
      <news:title>Best AI SOC platforms 2026? I am not convinced about AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cloud-security/microsoft-salesforce-patch-ai-agent-data-leak-flaws</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:00:00.000Z</news:publication_date>
      <news:title>Microsoft, Salesforce Patch AI Agent Data Leak Flaws</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-some-windows-servers-ask-for-bitlocker-key-after-april-updates/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:41:35.000Z</news:publication_date>
      <news:title>Microsoft: April updates trigger BitLocker key prompts on some servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/two-vulnerabilities-patched-in-ivanti-neurons-for-itsm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:38:21.000Z</news:publication_date>
      <news:title>Two Vulnerabilities Patched in Ivanti Neurons for ITSM</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/deterministic-agentic-ai-architecture.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:30:00.000Z</news:publication_date>
      <news:title>Deterministic + Agentic AI: The Architecture Exposure Validation Requires</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm382i/upgrading_riptides_to_tls_13_forward_secrecy_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:23:56.000Z</news:publication_date>
      <news:title>Upgrading Riptides to TLS 1.3: Forward Secrecy and a Path to Post-Quantum mTLS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/10-domain-could-have-handed-hackers-25k-endpoints-including-in-ot-and-gov-networks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:58:12.000Z</news:publication_date>
      <news:title>$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm2hb3/how_to_secure_shared_devices_without_shared/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:47:35.000Z</news:publication_date>
      <news:title>How to secure shared devices without shared credentials (Cyber Essentials compliance)?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm2gzl/we_built_a_tool_for_data_exfiltration_via_audio/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:47:08.000Z</news:publication_date>
      <news:title>We built a tool for data exfiltration via audio Bluetooth (looking for feedback)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm2fju/thesis_idea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:45:11.000Z</news:publication_date>
      <news:title>Thesis Idea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/sitehop-safecore-edge-pqc-device/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:38:38.000Z</news:publication_date>
      <news:title>Sitehop’s SAFEcore Edge enables ultra-low-latency, hardware-enforced post-quantum encryption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/from-fake-proton-vpn-sites-to-gaming-mods-this-windows-infostealer-is-everywhere</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:37:33.000Z</news:publication_date>
      <news:title>From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ai-companies-to-play-bigger-role/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:30:00.000Z</news:publication_date>
      <news:title>AI Companies To Play Bigger Role in CVE Program, Says CISA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trump-urges-extending-foreign-surveillance-program-as-some-lawmakers-push-for-us-privacy-protections/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:25:56.000Z</news:publication_date>
      <news:title>Trump Urges Extending Foreign Surveillance Program as Some Lawmakers Push for US Privacy Protections</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-windows-server-2025-automatic-upgrades/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:24:53.000Z</news:publication_date>
      <news:title>Microsoft fixes bug behind Windows Server 2025 automatic upgrades</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm204b/we_had_three_employees_locked_out_this_quarter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:22:45.000Z</news:publication_date>
      <news:title>We had three employees locked out this quarter because of lost authenticator apps. Time to rethink our recovery story.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sm1xbz/minimus_openclaw_red_team_agent_read_its_own_docs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:18:22.000Z</news:publication_date>
      <news:title>Minimus OpenClaw red team: agent read its own docs, escaped the sandbox via exec tool's host parameter, rewrote WhatsApp config, messaged real people. 635 tests, 131 failures, zero CVEs exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm1xbi/how_are_you_actually_building_a_cybertechnical/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:18:21.000Z</news:publication_date>
      <news:title>How are you actually building a cyber/technical BIA? hitting a wall at the asset-to-business-service mapping step.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:00:00.000Z</news:publication_date>
      <news:title>We’re only seeing the tip of the chip-smuggling iceberg</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/deepfake-nudify-schools-global-crisis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:00:00.000Z</news:publication_date>
      <news:title>The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm1kc6/be_safe_fiverr_is_leaking_server_credentials_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:58:49.000Z</news:publication_date>
      <news:title>Be Safe : Fiverr Is Leaking Server Credentials and VPN Passwords on Google Right Now</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/april-patch-tuesday-fixes-two-zero-days-including-one-under-active-attack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:57:15.000Z</news:publication_date>
      <news:title>April Patch Tuesday fixes two zero-days, including one under active attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/black-shrantac-exposes-industrial-environments-to-stealth-ransomware-risk-through-lotl-double-extortion-tactics/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:47:16.000Z</news:publication_date>
      <news:title>Black Shrantac exposes industrial environments to stealth ransomware risk through LOTL, double extortion tactics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/manufacturing/manufacturing-absorbs-56-ransomware-surge-of-global-attacks-in-2025-as-raas-legacy-ot-supply-chains-fuel-spike/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:42:34.000Z</news:publication_date>
      <news:title>Manufacturing absorbs 56% ransomware surge of global attacks in 2025, as RaaS, legacy OT, supply chains fuel spike</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/ababil-of-minab-claims-cyberattack-on-lacmta-exposing-risks-to-rail-control-systems-and-critical-transit-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:42:20.000Z</news:publication_date>
      <news:title>Ababil of Minab claims cyberattack on LACMTA, exposing risks to rail control systems and critical transit infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fortinet-patches-critical-fortisandbox-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:37:24.000Z</news:publication_date>
      <news:title>Fortinet Patches Critical FortiSandbox Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/claroty-launches-visibility-orchestration-in-xdome-to-boost-cps-asset-visibility-and-security-eliminate-blind-spots/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:34:44.000Z</news:publication_date>
      <news:title>Claroty launches Visibility Orchestration in xDome to boost CPS asset visibility and security, eliminate blind spots</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/researchers-surge-bruteforce/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:30:00.000Z</news:publication_date>
      <news:title>Researchers Spot Surge in Brute-Force Attacks from Middle East</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm104g/do_companies_usually_do_whitebox_testing_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:25:57.000Z</news:publication_date>
      <news:title>Do companies usually do white-box testing in pentests, or do they stick to more limited access approaches?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/microsoft-two-zerodays-april-patch/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:10:00.000Z</news:publication_date>
      <news:title>Microsoft Fixes Two Zero-Days in April Patch Tuesday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/credit-resources-vault-why-this-credit-email-set-off-our-scam-alarms</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:08:47.000Z</news:publication_date>
      <news:title>Credit Resources Vault: Why this credit email set off our scam alarms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sm0g6r/what_i_wished_someone_told_me_before_my_first/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:53:15.000Z</news:publication_date>
      <news:title>What I wished someone told me before my first real cybersecurity job</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/raspberry-pi-os-6-2-sudo-security-update/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:50:51.000Z</news:publication_date>
      <news:title>Raspberry Pi OS 6.2 disables passwordless sudo by default</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sm0afg/kerberoasting_detection_gaps_in_mixedencryption/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:43:37.000Z</news:publication_date>
      <news:title>Kerberoasting detection gaps in mixed-encryption environments and why 0x17 filtering alone isn't enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:40:00.000Z</news:publication_date>
      <news:title>Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/nginx-1-30-0-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:22:57.000Z</news:publication_date>
      <news:title>What changed in nginx 1.30.0 and what it means for your upstream config</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slztb2/microsoft_adds_windows_protections_for_malicious/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:14:22.000Z</news:publication_date>
      <news:title>Microsoft adds Windows protections for malicious Remote Desktop files</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slzss6/microsoft_april_2026_patch_tuesday_fixes_167/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:13:32.000Z</news:publication_date>
      <news:title>Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slz9la/resources_for_python_secure_coding/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:42:15.000Z</news:publication_date>
      <news:title>Resources for python secure coding.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1slz48l/two_adminlevel_api_keys_publicly_exposed_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:33:19.000Z</news:publication_date>
      <news:title>Two Admin-level API keys publicly exposed for years, both dismissed as "Out of scope" by official bug bounty programs. Case analysis + proposed NHI Exposure Severity Index</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/ics-patch-tuesday-8-industrial-giants-publish-new-security-advisories/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:14:08.000Z</news:publication_date>
      <news:title>ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slyld2/i_got_a_malicious_files_to_my_extension/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:02:19.000Z</news:publication_date>
      <news:title>I Got A Malicious Files To My Extension</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/openai-gpt-5-4-cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T06:24:41.000Z</news:publication_date>
      <news:title>OpenAI expands its cyber defense program with GPT-5.4-Cyber for vetted researchers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slxndr/need_a_template_for_vulnerability_management/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T06:08:19.000Z</news:publication_date>
      <news:title>Need a template for Vulnerability management reports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slxlzx/how_many_head_counts_does_your_team_have_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T06:06:03.000Z</news:publication_date>
      <news:title>How many head counts does your team have for vulnerability management ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/anthropic-claude-mythos-ai-vulnerability-discovery/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T06:00:34.000Z</news:publication_date>
      <news:title>The exploit gap is closing, and your patch cycle wasn’t built for this</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slx5ag/the_rise_of_ai_pentesting_agents_a_technical/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:40:13.000Z</news:publication_date>
      <news:title>The Rise of AI Pentesting Agents: A Technical Analysis</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slx57s/research_partner_needed_paper_publication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:40:07.000Z</news:publication_date>
      <news:title>Research partner needed - paper publication</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/nuno-rodrigues-carvalho-enisa-cve-program-vulnerability-disclosure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:30:18.000Z</news:publication_date>
      <news:title>Coordinated vulnerability disclosure is now an EU obligation, but cultural change takes time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slwxg7/looking_for_ukrainians_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:28:18.000Z</news:publication_date>
      <news:title>Looking for Ukrainians in Cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/legitify-open-source-scanner-security-misconfigurations-github-gitlab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:00:34.000Z</news:publication_date>
      <news:title>Legitify: Open-source scanner for security misconfigurations on GitHub and GitLab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/product-showcase-gitguardian-ggshield-ai-hook/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T04:30:50.000Z</news:publication_date>
      <news:title>Product showcase: Stop secrets from leaking through AI coding tools with GitGuardian</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T04:30:00.000Z</news:publication_date>
      <news:title>OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/network-segmentation-failure-research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T04:00:26.000Z</news:publication_date>
      <news:title>Network segmentation projects fail in predictable patterns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slv34o/linux_anomaly_detection_agent_using_ebpf_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T03:53:26.000Z</news:publication_date>
      <news:title>Linux Anomaly Detection Agent using eBPF and Isolation Forest</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slufwp/how_do_you_manage_dependency_and_supply_chain/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T03:23:00.000Z</news:publication_date>
      <news:title>How do you manage dependency and supply chain risk in modern application security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slt9jg/how_is_the_job_market_for_those_in_grc_and_audit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T02:29:31.000Z</news:publication_date>
      <news:title>How is the job market for those in GRC and Audit roles ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slt49s/addicted_to_hacking_young_hacker_behind_historic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T02:22:48.000Z</news:publication_date>
      <news:title>'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slsr0c/building_a_username_osint_correlator_struggling/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T02:06:05.000Z</news:publication_date>
      <news:title>Building a username OSINT correlator — struggling with false positives</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32900</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Wednesday, April 15th, 2026 https://isc.sans.edu/podcastdetail/9892, (Wed, Apr 15th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1slsl59/anthropics_claude_mythos_found_individual_bugs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T01:58:48.000Z</news:publication_date>
      <news:title>Anthropic's Claude Mythos Found Individual Bugs. Mythos SI (Structured Intelligence) Found the Class They Belong To.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slsaen/software_development_and_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T01:45:36.000Z</news:publication_date>
      <news:title>Software Development and IT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sls6iy/after_doing_ctfs_how_confident_are_you_applying/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T01:40:55.000Z</news:publication_date>
      <news:title>After doing CTFs, how confident are you applying them to real‑world systems?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1slruao/yara_rules_tool/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T01:25:35.000Z</news:publication_date>
      <news:title>YARA Rules Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slr2sb/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T00:51:05.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slr2sb/identity_governance_sailpoint_the_rising_demand/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T00:51:05.000Z</news:publication_date>
      <news:title>Identity Governance &amp; SailPoint: The Rising Demand for IAM Professionals in 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1slqr27/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T00:36:27.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slqg5b/fall_in_the_thermaltake_captcha/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T00:23:20.000Z</news:publication_date>
      <news:title>Fall in the thermaltake captcha</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32896</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T00:19:53.000Z</news:publication_date>
      <news:title>Scanning for AI Models, (Tue, Apr 14th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cloud-security/microsoft-bets-10-billion-to-boost-japan-s-ai-cybersecurity</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T00:00:08.000Z</news:publication_date>
      <news:title>Microsoft Bets $10 Billion to Boost Japan's AI, Cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/your-supply-chain-breach-is-someone-else-payday</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T00:00:00.000Z</news:publication_date>
      <news:title>Your Supply Chain Breach Is Someone Else's Payday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slp3jo/how_to_grow_professionally_and_change_jobs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:25:01.000Z</news:publication_date>
      <news:title>How to grow professionally and change jobs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/cisa-cancels-cybercorps-internships-dhs-funding-crisis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:17:33.000Z</news:publication_date>
      <news:title>CISA cancels summer internships for cyber scholarship students amid DHS funding lapse</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:59:27.000Z</news:publication_date>
      <news:title>Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-windows-protections-for-malicious-remote-desktop-files/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:23:33.000Z</news:publication_date>
      <news:title>Microsoft adds Windows protections for malicious Remote Desktop files</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slnljb/capstone_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:23:27.000Z</news:publication_date>
      <news:title>Capstone Help</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sln81x/orbyx_ai_spm_open_source_ai_security_posture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:08:46.000Z</news:publication_date>
      <news:title>Orbyx AI SPM - Open Source AI Security Posture Management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sln5jf/4_years_as_fullstack_dev_want_to_pivot_to_a_role/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:06:09.000Z</news:publication_date>
      <news:title>4 years as Full-Stack Dev → Want to pivot to a role that combines development + cybersecurity.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/15/microsoft-office-sensitivity-labels-permissions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:05:41.000Z</news:publication_date>
      <news:title>Microsoft ends desktop detour for sensitivity labels in Office web apps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:58:31.000Z</news:publication_date>
      <news:title>Crypto-exchange Kraken extorted by hackers after insider breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:47:59.000Z</news:publication_date>
      <news:title>Patch Tuesday, April 2026 Edition</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slmoev/orbyx_ai_spm_open_source_ai_security_posture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:47:29.000Z</news:publication_date>
      <news:title>Orbyx AI SPM - open source AI Security Posture Management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/privilege-elevation-dominates-microsoft-patch-update</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:22:07.000Z</news:publication_date>
      <news:title>Privilege Elevation Dominates Massive Microsoft Patch Update</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sllxth/using_nix_or_docker_for_reproducible_development/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:19:58.000Z</news:publication_date>
      <news:title>Using Nix or Docker for reproducible Development Environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/claude-mythos-prepare-for-AI-cybersecurity-questions-from-your-board-of-directors</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:45:00.000Z</news:publication_date>
      <news:title>Claude Mythos: Prepare for your board’s cybersecurity questions about the latest AI model from Anthropic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:33:00.000Z</news:publication_date>
      <news:title>Over 100 Chrome extensions in Web Store target users accounts and data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1slkjnq/behavioral_analysis_xworm_v65_rat_dropper_via/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:28:04.000Z</news:publication_date>
      <news:title>Behavioral Analysis: XWorm v6.5 RAT Dropper via Batch File</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/microsoft-patch-tuesday-april-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:27:39.000Z</news:publication_date>
      <news:title>Microsoft drops its second-largest monthly batch of defects on record</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/edr-killer-ecosystem-expansion-requires-stronger-byovd-defenses</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:20:34.000Z</news:publication_date>
      <news:title>EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/04/14/microsoft-and-adobe-patch-tuesday-april-2026-security-update-review</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:16:14.000Z</news:publication_date>
      <news:title>Microsoft and Adobe Patch Tuesday, April 2026 Security Update Review</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/space-force-ciso-touts-ai-impact-cyber-compliance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:00:34.000Z</news:publication_date>
      <news:title>Space Force official touts AI’s impact on cyber compliance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/in-the-wake-of-anthropics-mythos-openai-has-a-new-cybersecurity-model-and-strategy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:00:17.000Z</news:publication_date>
      <news:title>In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model—and Strategy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/new-janaware-ransomware-targeting-turkey</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:35:00.000Z</news:publication_date>
      <news:title>New ‘JanaWare’ ransomware targeting Turkish citizens as cybercriminal ecosystem fragments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sli56g/i_compiled_years_of_active_directory_admin_notes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:03:11.000Z</news:publication_date>
      <news:title>I compiled years of Active Directory admin notes into a 28-page quick reference (PowerShell, GPO, Event IDs, attacks)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/telegram-is-still-hosting-a-sanctioned-21-billion-crypto-scammer-black-market/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:56:08.000Z</news:publication_date>
      <news:title>Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slhr2x/suspicious_but_not_critical_alerts_act/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:49:32.000Z</news:publication_date>
      <news:title>Suspicious but not critical alerts: act immediately or monitor first?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slgu4f/my_osint_platform_with_1300_tools_in_30_languages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:17:33.000Z</news:publication_date>
      <news:title>My OSINT platform with 1300+ tools in 30 languages!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/microsoft-patches-exploited-sharepoint-zero-day-and-160-other-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:14:37.000Z</news:publication_date>
      <news:title>Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-kb5082200-extended-security-update/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:09:39.000Z</news:publication_date>
      <news:title>Microsoft releases Windows 10 KB5082200 extended security update</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/mcgraw-hill-confirms-data-breach-following-extortion-threat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:07:07.000Z</news:publication_date>
      <news:title>McGraw-Hill confirms data breach following extortion threat</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/microsofts-april-2026-patch-tuesday-addresses-163-cves-cve-2026-32201</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:52:08.000Z</news:publication_date>
      <news:title>Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/windows-11-cumulative-updates-kb5083769-and-kb5082052-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:46:31.000Z</news:publication_date>
      <news:title>Windows 11 cumulative updates KB5083769 &amp; KB5082052 released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32898</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:46:09.000Z</news:publication_date>
      <news:title>Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:41:13.000Z</news:publication_date>
      <news:title>Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slfplo/kraken_insider_threat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:38:42.000Z</news:publication_date>
      <news:title>Kraken Insider threat</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sleual/a_critical_vulnerability_found_in_one_of_gpuzs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:08:22.000Z</news:publication_date>
      <news:title>A critical vulnerability found in one of GPU-Z's drivers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/virginia-enacts-ban-on-precise-geolocation-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:51:00.000Z</news:publication_date>
      <news:title>Virginia enacts ban on precise geolocation data sales as momentum for similar prohibitions builds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/adobe-patches-55-vulnerabilities-across-11-products/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:48:03.000Z</news:publication_date>
      <news:title>Adobe Patches 55 Vulnerabilities Across 11 Products</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/fake-ledger-live-app-on-apples-app-store-stole-95m-in-crypto/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:37:01.000Z</news:publication_date>
      <news:title>Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/black-basta-affiliates-senior-executives-reliaquest/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:25:05.000Z</news:publication_date>
      <news:title>Black Basta’s playbook lives on as former affiliates launch fast-scale intrusion campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/wargame-demonstrates-social-media-manipulation</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:06:14.000Z</news:publication_date>
      <news:title>Wargame Exercise Demonstrates How Social Media Manipulation Works</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/new-php-composer-flaws-enable-arbitrary.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:57:00.000Z</news:publication_date>
      <news:title>New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slcq0l/need_advice_backend_soar_engineer_offered_insider/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:54:10.000Z</news:publication_date>
      <news:title>Need advice: Backend SOAR engineer offered Insider Threat Role, dont know what to do</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-fast-track-to-reinstate-windows-hardware-dev-accounts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:53:50.000Z</news:publication_date>
      <news:title>Microsoft rolls out fast-track to reinstate Windows hardware dev accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/openssl-4-0-0-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:46:52.000Z</news:publication_date>
      <news:title>OpenSSL 4.0.0 release cuts deprecated protocols and gains post-quantum support</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slcdzs/cheat_sheet_for_discovering_agentic_identity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:42:21.000Z</news:publication_date>
      <news:title>Cheat Sheet for Discovering Agentic Identity Owners</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slbphu/stuck_in_dilemma/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:18:02.000Z</news:publication_date>
      <news:title>Stuck in dilemma</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/the-fcc-has-a-fast-lane-for-complaints-about-trumps-media-critics/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:12:28.000Z</news:publication_date>
      <news:title>The FCC Has a Fast Lane for Complaints About Trump’s Media Critics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/claude-mythos-test-attack-capabilities-limits/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:06:53.000Z</news:publication_date>
      <news:title>Testing reveals Claude Mythos’s offensive capabilities and limits</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slaxa6/mobile_number_getting_random_verification_codes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:50:19.000Z</news:publication_date>
      <news:title>Mobile number getting random verification codes from apps I’ve never used — should I be worried?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slapup/would_git_for_networks_actually_be_useful/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:42:43.000Z</news:publication_date>
      <news:title>Would “Git for networks” actually be useful?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/ai-driven-pushpaganda-scam-exploits.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:30:00.000Z</news:publication_date>
      <news:title>AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1slaaih/axios_10_10_cve_is_not_realistically_exploitable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:26:58.000Z</news:publication_date>
      <news:title>Axios 10 / 10 CVE is not realistically exploitable - CVE-2026-40175</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sla6ju/common_entra_id_security_assessment_findings_part/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:22:54.000Z</news:publication_date>
      <news:title>Common Entra ID Security Assessment Findings – Part 4: Weak Conditional Access Policies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/fbi-w3ll-phishing-kit-takedown/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:15:18.000Z</news:publication_date>
      <news:title>W3LL phishing service sold for $500 dismantled by the FBI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl9res/google_cloud_phishing_drops_remcos_rat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:07:37.000Z</news:publication_date>
      <news:title>Google Cloud Phishing Drops Remcos RAT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/5-ways-zero-trust-maximizes-identity-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:02:12.000Z</news:publication_date>
      <news:title>5 Ways Zero Trust Maximizes Identity Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/google-adds-rust-based-dns-parser-into.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:55:00.000Z</news:publication_date>
      <news:title>Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/russia-cracks-down-bluesky-internet</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:51:00.000Z</news:publication_date>
      <news:title>Russia appears to block social media platform Bluesky amid wider internet restrictions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/claroty-visibility-orchestration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:40:16.000Z</news:publication_date>
      <news:title>Claroty advances CPS security with Visibility Orchestration in xDome</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/black-veatch-takepoint-research-finds-fragmented-ownership-slows-secure-by-design-adoption-pushing-cyber-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:30:01.000Z</news:publication_date>
      <news:title>Black &amp; Veatch-Takepoint Research finds fragmented ownership slows secure-by-design adoption, pushing cyber risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/oligo-enables-real-time-exploit-detection-and-blocking-at-application-runtime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:27:33.000Z</news:publication_date>
      <news:title>Oligo enables real-time exploit detection and blocking at application runtime</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sl8l4h/prometheus_alerting_rules_for_ebpf_snmp_wireguard/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:22:29.000Z</news:publication_date>
      <news:title>Prometheus alerting rules for eBPF, SNMP, WireGuard, Cilium and cert-manager added to awesome-prometheus-alerts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl89jf/argus_found_18_validated_exploits_in_ffmpeg_curl/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:09:53.000Z</news:publication_date>
      <news:title>Argus – found 18 validated exploits in ffmpeg, curl, OpenSSL, SQLite, and Django using LLM-driven autonomous vulnerability discovery</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl88yb/certification_recommendations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:09:15.000Z</news:publication_date>
      <news:title>Certification recommendations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl88cu/edrxdr_bypass_and_detection_evasion_techniques_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:08:34.000Z</news:publication_date>
      <news:title>EDR/XDR Bypass and Detection Evasion Techniques: An Investigation of Advanced Evasion Strategies from a Red Team Perspective</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl8845/ransomware_is_growing_three_times_faster_than_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:08:17.000Z</news:publication_date>
      <news:title>Ransomware Is Growing Three Times Faster Than the Spending Meant to Stop It</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/cisos-innovate-talent-retention/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:00:00.000Z</news:publication_date>
      <news:title>CISOs Urged to Innovate with Talent Retention as Job Satisfaction Declines</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/davmail-6-6-0-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:58:40.000Z</news:publication_date>
      <news:title>DavMail 6.6.0 patches a regex flaw and advances its Microsoft Graph backend</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/mythos-ready-security-csa-urges-cisos-to-prepare-for-accelerated-ai-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:53:55.000Z</news:publication_date>
      <news:title>‘Mythos-Ready’ Security: CSA Urges CISOs to Prepare for Accelerated AI Threats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/utilities-energy-power-water-waste/epa-proposes-19-million-information-security-boost-to-guard-water-systems-from-cyber-threats-moves-resilience-to-forefront/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:51:52.000Z</news:publication_date>
      <news:title>EPA proposes $19 million information security boost to guard water systems from cyber threats, moves resilience to forefront</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/basic-fit-data-breach-1-million-members-europe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:50:54.000Z</news:publication_date>
      <news:title>Basic-Fit hack compromises data of up to 1 million members</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/europes-largest-gym-chain-says-data-breach-impacts-1-million-members/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:43:30.000Z</news:publication_date>
      <news:title>Europe’s Largest Gym Chain Says Data Breach Impacts 1 Million Members</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl7e4x/release_stegoforge_a_hybrid_python_framework_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:34:13.000Z</news:publication_date>
      <news:title>Release: StegoForge - A hybrid Python framework for multimedia steganography, zero-knowledge ML forensics, and deniable encryption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sl6thg/new_report_digital_exposure_of_european_telecoms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:09:30.000Z</news:publication_date>
      <news:title>New Report: Digital Exposure of European Telecoms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl6rsc/hallmark_breach_17m_records_including_names/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:07:23.000Z</news:publication_date>
      <news:title>Hallmark Breach: 1.7M records, including names, phones, addresses and support tickets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/14/cisa-adds-two-known-exploited-vulnerabilities-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/triad-nexus-expands-fraud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:00:00.000Z</news:publication_date>
      <news:title>Triad Nexus Expands Global Fraud Operations Despite US Sanctions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/datavisor-vera/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:59:42.000Z</news:publication_date>
      <news:title>DataVisor brings conversational AI agents to fraud and AML operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/omnistealer-uses-the-blockchain-to-steal-everything-it-can</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:52:15.000Z</news:publication_date>
      <news:title>Omnistealer uses the blockchain to steal everything it can</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl6e5d/controversial_take_cyber_sec_more_important_than/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:50:49.000Z</news:publication_date>
      <news:title>Controversial take? Cyber sec more important than ever in a world with AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl6b3r/adobes_pdf_reader_five_month_active_zeroday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:46:58.000Z</news:publication_date>
      <news:title>Adobe's PDF Reader Five Month Active Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/nist/nist-develops-trustworthy-ai-in-critical-infrastructure-profile-to-align-risk-resilience-and-infrastructure-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:46:39.000Z</news:publication_date>
      <news:title>NIST develops Trustworthy AI in Critical Infrastructure Profile to align risk, resilience, and infrastructure security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl677j/were_building_a_cyber_residency_to_bridge_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:41:48.000Z</news:publication_date>
      <news:title>We’re building a cyber residency to bridge the "Junior Gap," and the biggest hurdle isn't the technical skill—it's the noise.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl672x/musician_loses_lifes_savings_after_downloading/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:41:38.000Z</news:publication_date>
      <news:title>Musician loses life's savings after downloading fake app from Apple App Store</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/booking-com-data-breach-customer-reservation-data-exposed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:40:39.000Z</news:publication_date>
      <news:title>Booking.com data breach: Customer reservation data exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/binary-defense-nightbeacon-detect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:37:02.000Z</news:publication_date>
      <news:title>Binary Defense expands NightBeacon with threat-aligned Detection Coverage Index</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/chrome-extensions-expose-user-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:30:00.000Z</news:publication_date>
      <news:title>Malicious Chrome Extensions Campaign Exposes User Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/sap-patches-critical-abap-vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:21:12.000Z</news:publication_date>
      <news:title>SAP Patches Critical ABAP Vulnerability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl5qj2/хочу_услышать_ваше_мнение/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:19:21.000Z</news:publication_date>
      <news:title>Хочу услышать ваше мнение</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl5oha/detecting_uk_pii_inbrowser_before_exfiltration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:16:24.000Z</news:publication_date>
      <news:title>Detecting UK PII in-browser before exfiltration — viable approach?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/triad-nexus-evades-sanctions-to-fuel-cybercrime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:53:32.000Z</news:publication_date>
      <news:title>Triad Nexus Evades Sanctions to Fuel Cybercrime</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl4zrc/european_gym_giant_basicfit_data_breach_affects_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:41:24.000Z</news:publication_date>
      <news:title>European Gym giant Basic-Fit data breach affects 1 million members</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl4t88/fedramp_vulnerability_remediation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:31:41.000Z</news:publication_date>
      <news:title>FedRamp Vulnerability Remediation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl4npx/the_forensic_readiness_market_is_fragmented_what/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:23:39.000Z</news:publication_date>
      <news:title>The Forensic Readiness Market Is Fragmented: What Enterprises Really Purchase</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-adds-rust-dns-parser-to-pixel-phones-for-better-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:21:33.000Z</news:publication_date>
      <news:title>Google Adds Rust DNS Parser to Pixel Phones for Better Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/mirax-android-rat-turns-devices-into.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:20:00.000Z</news:publication_date>
      <news:title>Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/google-back-button-hijacking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:04:12.000Z</news:publication_date>
      <news:title>Google to penalize sites that hijack the back button</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/analysis-of-216m-security-findings.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:00:00.000Z</news:publication_date>
      <news:title>Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/national-security-ntsc-op-ed-sean-plankey-cisa-confirmed-director/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:00:00.000Z</news:publication_date>
      <news:title>Secretary Mullin must help finish the job: Urge the Senate to confirm Plankey</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sl442h/a_private_company_now_has_powerful_zeroday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:55:01.000Z</news:publication_date>
      <news:title>A private company now has powerful zero-day exploits of almost every software project you've heard of.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/ai/2026/04/chatgpt-under-scrutiny-as-florida-investigates-campus-shooting</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:45:35.000Z</news:publication_date>
      <news:title>ChatGPT under scrutiny as Florida investigates campus shooting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/nightclub-giant-rci-hospitality-reports-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:35:06.000Z</news:publication_date>
      <news:title>Nightclub Giant RCI Hospitality Reports Data Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ai-security-institute-best/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:30:00.000Z</news:publication_date>
      <news:title>AI Security Institute Advocates Security Best Practices After Mythos Test</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/ai-adoption-safety-transparency-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:22:41.000Z</news:publication_date>
      <news:title>AI adoption is outpacing the safeguards around it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/organizations-warned-of-exploited-windows-adobe-acrobat-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T08:57:18.000Z</news:publication_date>
      <news:title>Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl2yrv/is_it_really_necessary_to_stick_to_any_particular/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T08:48:11.000Z</news:publication_date>
      <news:title>Is it really necessary to stick to any particular domain of cybersecurity to get the internship in it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/108-malicious-chrome-extensions-steal.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T08:35:00.000Z</news:publication_date>
      <news:title>108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl1oay/im_pretty_confident_that_i_have_some_form_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:31:10.000Z</news:publication_date>
      <news:title>I'm pretty confident that I have some form of malware, but I'm unsure of what it is. I have 102 instances of wsl.exe and 54 instances of conhost.exe all running at once. What should I do?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sl1nrb/how_do_teams_decide_what_to_fix_first/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:30:18.000Z</news:publication_date>
      <news:title>How do teams decide what to fix first?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/idan-habler-cisco-agentic-ai-memory-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T06:00:18.000Z</news:publication_date>
      <news:title>Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skzynb/preparing_for_postquantum_cryptography_the_secure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:52:06.000Z</news:publication_date>
      <news:title>Preparing for Post-Quantum Cryptography: The Secure Firewall Roadmap</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/showdoc-rce-flaw-cve-2025-0520-actively.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:50:00.000Z</news:publication_date>
      <news:title>ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skzu2z/pros_and_cons_of_btl1_vs_htb_cdsa_for_getting_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:45:14.000Z</news:publication_date>
      <news:title>Pros and cons of BTL1 vs HTB CDSA for getting and passing an interview for SOC Analyst entry level job</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cisa-adds-6-known-exploited-flaws-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:39:00.000Z</news:publication_date>
      <news:title>CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/review-the-psychology-of-information-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:30:08.000Z</news:publication_date>
      <news:title>Review: The Psychology of Information Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skzb17/security_fatigue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:16:42.000Z</news:publication_date>
      <news:title>Security Fatigue</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skz7hm/shadownet_v350_deadlock_6hop_integration_tormixnet/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:11:29.000Z</news:publication_date>
      <news:title>ShadowNet v3.5.0 - Deadlock (6-Hop Integration) TorMixnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/gitguardian-ai-agents-credentials-leak/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:00:40.000Z</news:publication_date>
      <news:title>29 million leaked secrets in 2025: Why AI agents credentials are out of control</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/patch-tuesday-analysis-april-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:00:00.000Z</news:publication_date>
      <news:title>April 2026 Patch Tuesday: Two Zero-Days and Eight Critical Vulnerabilities Among 164 CVEs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/zero-trust-identity-security-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T04:30:18.000Z</news:publication_date>
      <news:title>Zero trust at year two: What nobody planned for</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/14/cybersecurity-jobs-available-right-now-april-14-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T04:00:57.000Z</news:publication_date>
      <news:title>Cybersecurity jobs available right now: April 14, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skxpmm/cyber_security_from_having_a_job_that_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:55:06.000Z</news:publication_date>
      <news:title>Cyber Security from having a job that is prestigious and genuinely cool to "AI is taking all of our jobs away</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skxo64/what_are_peoples_opinions_about_didit_as_a_human/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:53:01.000Z</news:publication_date>
      <news:title>What are people’s opinions about Didit as a human verification tool?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skx19m/how_do_you_actually_stay_safe_from_phishing_these/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:22:30.000Z</news:publication_date>
      <news:title>How do you actually stay safe from phishing these days?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1skwr2x/codex_hacked_a_samsung_tv/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:09:24.000Z</news:publication_date>
      <news:title>Codex Hacked a Samsung TV</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skw31d/wordpress_google_authenticator_up_to_055/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T02:39:18.000Z</news:publication_date>
      <news:title>🚨 Wordpress | Google Authenticator up to 0.55 - Cross-Site Request Forgery to 2FA Secret Overwrite</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skvvvm/how_much_do_you_rely_on_automation_vs_manual_work/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T02:30:12.000Z</news:publication_date>
      <news:title>How much do you rely on automation vs manual work in vulnerability hunting?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32894</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sktmgu/built_a_preexecution_authorization_gate_for_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T00:51:43.000Z</news:publication_date>
      <news:title>Built a pre-execution authorization gate for AI agents after watching the Meta incident — v1.6.0 now has model identity verification too</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/recorded-future-solutions-packages</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T00:00:00.000Z</news:publication_date>
      <news:title>A New Way to Buy Recorded Future: Solutions and Packages Built for the 2026 Threat Landscape</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/pricing-blog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T00:00:00.000Z</news:publication_date>
      <news:title>A New Way to Buy Recorded Future: Solutions and Packages Built for the 2026 Threat Landscape</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/research/iran-war-future-scenario-and-business-improvements</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T00:00:00.000Z</news:publication_date>
      <news:title>Iran War: Future Scenario and Business Improvements</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/phantom-in-the-vault</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T00:00:00.000Z</news:publication_date>
      <news:title>Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sks8tj/4_years_of_cybersecurity_consulting_and_any_tips/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T23:50:59.000Z</news:publication_date>
      <news:title>4 years of cybersecurity consulting and any tips on getting back into hands on work?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skr498/vulnerability_scanning_build_package_vs_app_at/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T23:03:58.000Z</news:publication_date>
      <news:title>Vulnerability Scanning Build Package vs App at Run Time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/european-gym-giant-basic-fit-data-breach-affects-1-million-members/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T21:50:01.000Z</news:publication_date>
      <news:title>European Gym giant Basic-Fit data breach affects 1 million members</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cloud-security/test-networks-withstand-ddos-attacks-peak-loads</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T21:48:09.000Z</news:publication_date>
      <news:title>Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/claude-mythos-ai-cybersecurity-threat-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T21:43:37.000Z</news:publication_date>
      <news:title>Here’s how cyber heavyweights in the US and UK are dealing with Claude Mythos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cloud-security/csa-cisos-prepare-post-mythos-exploit-storm</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T21:29:31.000Z</news:publication_date>
      <news:title>CSA: CISOs Should Prepare for Post-Mythos Exploit Storm</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1skomzl/open_source_static_analysis_tool_with_payload/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T21:26:44.000Z</news:publication_date>
      <news:title>Open source static analysis tool with payload deobfuscation for detecting malicious patterns in source code and binaries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/adobe-patches-actively-exploited-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:52:38.000Z</news:publication_date>
      <news:title>Adobe Patches Actively Exploited Zero-Day That Lingered for Months</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/openai-axios-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:24:37.000Z</news:publication_date>
      <news:title>OpenAI’s Mac apps needs an update thanks to the Axios hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/social-media-ban-australia-research</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:21:31.000Z</news:publication_date>
      <news:title>Majority of Australian youth still use social media despite ban, researchers find</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:08:10.000Z</news:publication_date>
      <news:title>Stolen Rockstar Games analytics data leaked by extortion gang</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skmaqg/systemic_cyber_risk_when_data_breaches_become_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:05:01.000Z</news:publication_date>
      <news:title>Systemic Cyber Risk: When Data Breaches Become a National Security Issue | Ralph Ehlers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/critical-flaw-in-wolfssl-library-enables-forged-certificate-use/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T19:56:03.000Z</news:publication_date>
      <news:title>Critical flaw in wolfSSL library enables forged certificate use</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sklcop/finding_invisible_remoted_sockets_evidence_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T19:32:40.000Z</news:publication_date>
      <news:title>Finding "Invisible" remoted Sockets: Evidence of LotO (Living off the Orchard) Surveillance on Gifted macOS Hardware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/ics-ot-security/ot-lacks-tools-cryptographic-readiness</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T19:10:55.000Z</news:publication_date>
      <news:title>Empty Attestations: OT Lacks the Tools for Cryptographic Readiness</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/fbi-takedown-of-w3ll-phishing-service-leads-to-developer-arrest/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T18:55:50.000Z</news:publication_date>
      <news:title>FBI takedown of W3LL phishing service leads to developer arrest</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/bulletins/sb26-103</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T18:34:53.000Z</news:publication_date>
      <news:title>Vulnerability Summary for the Week of April 6, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1skjm2l/built_an_opensource_fair_tool_because_enterprise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T18:32:41.000Z</news:publication_date>
      <news:title>Built an open-source FAIR tool because enterprise risk quantification platforms are broken</news:title>
    </news:news>
  </url>
</urlset>