<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/20/product-showcase-syncthing-private-file-synchronization-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T04:30:14.000Z</news:publication_date>
      <news:title>Product showcase: Syncthing for secure, private file synchronization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqebn8/advice_on_m365_certification_path_for_entrylevel/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T03:52:07.000Z</news:publication_date>
      <news:title>Advice on M365 Certification Path for Entry-Level Cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/vercel-breach-tied-to-context-ai-hack.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T03:35:00.000Z</news:publication_date>
      <news:title>Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqcufv/incident_response_playbook_for_vercel_compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:41:29.000Z</news:publication_date>
      <news:title>Incident Response Playbook for Vercel compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqc89q/a_17yearold_excel_vulnerability_is_currently/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:13:18.000Z</news:publication_date>
      <news:title>A 17-year-old Excel vulnerability is currently being exploited by threat actors, and it's been flagged by the US' cyber defence agency</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32912</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:00:03.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 20th, 2026 https://isc.sans.edu/podcastdetail/9898, (Mon, Apr 20th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqboj5/vercel_breach_linked_to_infostealer_infection_at/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T01:48:07.000Z</news:publication_date>
      <news:title>Vercel Breach Linked to Infostealer Infection at Context.ai</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sqamsa/found_a_new_campaign_almost_the_hard_way/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T01:01:06.000Z</news:publication_date>
      <news:title>Found a new campaign (almost the hard way)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq9y63/a_circular_flow_model_for_agentic_ai_managing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T00:30:38.000Z</news:publication_date>
      <news:title>A Circular Flow Model for Agentic AI: Managing Recursive Risk and Operational Instability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq99py/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T00:00:11.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq6h27/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:59:30.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5rhl/qday_आ_रह_ह_indias_1000km_unhackable_network/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:30:45.000Z</news:publication_date>
      <news:title>Q-DAY आ रहा है! India's 1000km Unhackable Network | TruthSutra</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5e30/i_spent_7_days_evading_americas_82_million/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:16:11.000Z</news:publication_date>
      <news:title>I spent 7 days evading America’s 82 MILLION surveillance cameras</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq5273/cómo_consigo_trabajo_en_el_sector_ti/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T21:03:35.000Z</news:publication_date>
      <news:title>¿Cómo consigo trabajo en el sector TI?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq4mzq/se_puede_vivir_económicamente_de_la_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:47:29.000Z</news:publication_date>
      <news:title>Se puede vivir económicamente de la cyber seguridad o haciendo pentesting?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq3tlw/anyone_else_facing_invalid_jwt_token_in_gcp_lab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:16:25.000Z</news:publication_date>
      <news:title>anyone else facing “invalid jwt token” in gcp lab in MCRTA?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq3p6g/i_evaluated_440_security_certifications_and_built/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T20:11:49.000Z</news:publication_date>
      <news:title>I evaluated 440+ security certifications and built a free comparison tool ... would love your honest feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2u0i/vercel_had_an_internal_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:38:48.000Z</news:publication_date>
      <news:title>Vercel had an Internal Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2e9r/zorvyn_scam_got_exposed_by_xorcist/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:22:04.000Z</news:publication_date>
      <news:title>Zorvyn Scam Got Exposed By XorCist !! 🚨</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq2a6i/cloud_development_platform_vercel_confirms_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:17:49.000Z</news:publication_date>
      <news:title>Cloud development platform Vercel confirms breach as hackers claim to be selling stolen data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq1yj0/how_much_engineering_do_security_engineers_do/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:05:45.000Z</news:publication_date>
      <news:title>How much engineering do security engineers do?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq0shj/vercel_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T18:23:05.000Z</news:publication_date>
      <news:title>Vercel breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sq0al0/need_help_reversing_an_electron_stealer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T18:05:05.000Z</news:publication_date>
      <news:title>Need help reversing an electron stealer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spzkmr/does_preventing_cwe426_make_a_difference_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T17:39:34.000Z</news:publication_date>
      <news:title>Does preventing CWE-426 make a difference in practice?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T17:32:45.000Z</news:publication_date>
      <news:title>Vercel confirms breach as hackers claim to be selling stolen data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spzcec/vercel_disclosed_a_security_incident_today_april/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T17:31:30.000Z</news:publication_date>
      <news:title>Vercel disclosed a security incident today (April 19, 2026) - what's confirmed, what's reported, what to rotate</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spy3ah/usf_cybersecurity_program/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:44:50.000Z</news:publication_date>
      <news:title>USF Cybersecurity program</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spxak1/sandboxing_emails_from_office_365/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:15:09.000Z</news:publication_date>
      <news:title>Sandboxing Emails from Office 365</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/apple-account-change-alerts-abused-to-send-phishing-emails/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:03:01.000Z</news:publication_date>
      <news:title>Apple account change alerts abused to send phishing emails</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spws5y/built_these_two_systems_for_myself_a_multibackend/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:55:56.000Z</news:publication_date>
      <news:title>Built these two systems for myself - a multi-backend Al engine and a real-time security operations system. Here’s some live data from inside them. Full breakdown coming next.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spwduk/a_typical_pentest_report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:40:44.000Z</news:publication_date>
      <news:title>A typical pentest report</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spvwqs/vercel_says_internal_systems_hit_in_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:22:50.000Z</news:publication_date>
      <news:title>Vercel Says Internal Systems Hit in Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spvqrv/found_and_reported_a_secondorder_sql_injection_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T15:16:38.000Z</news:publication_date>
      <news:title>Found and reported a Second-Order SQL Injection in mailcow (CVE-2026-40871) – High severity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1spur67/discord_read_receipts_when_how_often_how_long/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T14:39:24.000Z</news:publication_date>
      <news:title>Discord Read Receipts: When, How Often, How Long</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/nist-to-stop-rating-non-priority-flaws-due-to-volume-increase/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T14:17:43.000Z</news:publication_date>
      <news:title>NIST to stop rating non-priority flaws due to volume increase</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sps9rb/need_suggestion/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:57:21.000Z</news:publication_date>
      <news:title>Need suggestion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sps9r2/soc_projects/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:57:20.000Z</news:publication_date>
      <news:title>SOC Projects</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spry0l/practical_adversarial_ml_i_broke_my_own_spam/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:42:32.000Z</news:publication_date>
      <news:title>Practical adversarial ML: I broke my own spam filter, added defenses, broke it again. Notes for anyone deploying ML in adversarial settings</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sprx8y/macbook_and_vms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:41:30.000Z</news:publication_date>
      <news:title>MacBook and VM’s</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spqye6/do_you_find_consistent_use_of_securitytxt_on_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T11:56:01.000Z</news:publication_date>
      <news:title>Do you find consistent use of "security.txt" on web servers?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spqssz/ciso_roles_and_responsibilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T11:48:12.000Z</news:publication_date>
      <news:title>CISO roles and responsibilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spov5s/vendor_refuses_cves_for_thirdparty_findings/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T10:03:05.000Z</news:publication_date>
      <news:title>Vendor refuses CVEs for third-party findings. Anything you can do?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/eight-years-in-the-industry-is-catching-up-to-the-threat-the-2026-buyers-guide/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T09:53:57.000Z</news:publication_date>
      <news:title>Eight Years In, the Industry is Catching Up to the Threat: The 2026 Buyers’ Guide</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spo2zp/usaf_cyber_to_navy_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T09:16:23.000Z</news:publication_date>
      <news:title>USAF Cyber to Navy Cyber</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spnv8c/automations_agentic_future_is_here_does_that_mean/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T09:03:50.000Z</news:publication_date>
      <news:title>"automation's agentic future is here" does that mean were we just scaling human error toward an August 2026 disaster?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spn68w/patch_sla_vs_vulnerability_metrics_how_are_others/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T08:22:18.000Z</news:publication_date>
      <news:title>Patch SLA vs vulnerability metrics — how are others reporting this to governance forums?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/19/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T08:00:06.000Z</news:publication_date>
      <news:title>Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spmiz8/need_suggestion_for_a_apt_emulation_tool_i_am/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:45:10.000Z</news:publication_date>
      <news:title>Need suggestion for a APT emulation tool I am working on</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spm69w/is_it_really_that_bad/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:24:35.000Z</news:publication_date>
      <news:title>Is it really that bad?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spl1pt/pearcer_modern_wireshark_alternative_with_threat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:21:22.000Z</news:publication_date>
      <news:title>Pearcer: Modern Wireshark Alternative with Threat Detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spkp7z/im_a_19_year_old_soc_analyst_this_is_my_cert_plan/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:02:21.000Z</news:publication_date>
      <news:title>I’m a 19 year old SOC Analyst, this is my cert plan</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spjj6v/otps_spotify_microsoft_suspicious_account/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T04:58:49.000Z</news:publication_date>
      <news:title>OTPs (Spotify + Microsoft) → suspicious “account accessed” SMS for unknown email</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spit3b/crest_crt_equivalency_renewal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T04:20:01.000Z</news:publication_date>
      <news:title>CREST CRT equivalency renewal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1spgkxy/subject_inquiry_regarding_localized_gem_induction/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T02:29:18.000Z</news:publication_date>
      <news:title>Subject: Inquiry Regarding Localized GEM Induction via High-Frequency Plasma</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spfzdg/cybersecurity_technical_writer_badly_needing_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T01:59:43.000Z</news:publication_date>
      <news:title>Cybersecurity Technical Writer badly needing to pivot</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1spfwtv/interviewing_for_cybersecurity_engineer_waf_at/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T01:56:17.000Z</news:publication_date>
      <news:title>Interviewing for Cybersecurity Engineer (WAF) at Visa — anyone been through this process?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp9vgz/made_snoop_an_ebpf_syscall_tracer_with_a_live_tui/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T21:23:24.000Z</news:publication_date>
      <news:title>Made snoop: an eBPF syscall tracer with a live TUI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp9i0u/a_segurança_digital_das_instituições_do_brasil_é/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T21:08:35.000Z</news:publication_date>
      <news:title>A segurança digital das instituições do Brasil é irrisória</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp8khe/is_the_issmo_role_dying/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T20:31:10.000Z</news:publication_date>
      <news:title>Is the ISSM/O role dying?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp6of9/llm_mcp_security_field_guide/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T19:17:38.000Z</news:publication_date>
      <news:title>LLM &amp; MCP Security Field Guide</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp54yq/totalrecall_reloaded_tool_finds_a_side_entrance/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T18:18:56.000Z</news:publication_date>
      <news:title>"TotalRecall Reloaded" tool finds a side entrance to Windows 11's Recall database</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp4xxe/ussanctioned_currency_exchange_says_15_million/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T18:11:28.000Z</news:publication_date>
      <news:title>US-sanctioned currency exchange says 15 million heist done by "unfriendly states"</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp4ne4/sans_rocky_mountian/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T18:00:35.000Z</news:publication_date>
      <news:title>SANS Rocky Mountian</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp3oc1/claude_scam_suspicious_terminal_command/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T17:23:45.000Z</news:publication_date>
      <news:title>Claude Scam - Suspicious Terminal Command</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp3ai2/job_market_and_being_out_of_operational_work_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T17:09:12.000Z</news:publication_date>
      <news:title>Job market and being out of operational work for over 7 years?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp32kf/some_reachability_analysis_for_your_saturday_read/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T17:01:01.000Z</news:publication_date>
      <news:title>Some reachability analysis for your Saturday read</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp2j8h/i_made_a_malicious_mcp_server_with_explained/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T16:40:31.000Z</news:publication_date>
      <news:title>I made a Malicious MCP Server with explained Attack Vector</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp2ee6/jumphost_vs_phishing_resistant_rdp/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T16:35:23.000Z</news:publication_date>
      <news:title>Jumphost vs phishing resistant rdp</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sp1q62/ai_hype_or_actual_replacement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T16:08:55.000Z</news:publication_date>
      <news:title>AI Hype or Actual Replacement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sp128h/cve202634621_poc_isnt_a_scanner_its_a_campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T15:43:37.000Z</news:publication_date>
      <news:title>CVE-2026-34621 PoC isn't a scanner, it's a campaign weaponizer with 62 pre-authenticated Brazilian fintech targets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/critical-flaw-in-protobuf-library-enables-javascript-code-execution/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T15:09:44.000Z</news:publication_date>
      <news:title>Critical flaw in Protobuf library enables JavaScript code execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sozxkd/do_you_have_colleagues_that_continuously_pass/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T15:00:47.000Z</news:publication_date>
      <news:title>Do you have colleagues that continuously pass OffSec certs but don't contribute much in workplace?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sozsti/linux_beginner/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T14:55:56.000Z</news:publication_date>
      <news:title>Linux beginner</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sozi1e/tpm_20_is_cool_actually_hardware_attestation_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T14:44:02.000Z</news:publication_date>
      <news:title>TPM 2.0 is cool, actually: hardware attestation for bare-metal fleets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-right-click-paste-broken-by-edge-update-bug/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T14:11:21.000Z</news:publication_date>
      <news:title>Microsoft Teams right-click paste broken by Edge update bug</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soyh9r/สกครงคนไทยไมแพชาตใดในโลก/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T14:03:03.000Z</news:publication_date>
      <news:title>สักครั้งคนไทยไม่แพ้ชาติใดในโลก</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soygak/securing_my_vps_docker_setup/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T14:01:53.000Z</news:publication_date>
      <news:title>Securing my VPS docker setup</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soyc3q/looking_for_guest_speaker/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:57:18.000Z</news:publication_date>
      <news:title>LOOKING FOR GUEST SPEAKER</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/nakivo-v112-ransomware-defense-faster-replication-vsphere-9-and-proxmox-ve-90-support/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:45:54.000Z</news:publication_date>
      <news:title>NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, and Proxmox VE 9.0 Support</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soxhih/bluesky_blames_ddos_attack_for_server_outages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:20:44.000Z</news:publication_date>
      <news:title>Bluesky blames DDoS attack for server outages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sox2em/microsoft_threat_intelligence_helpdesk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:02:01.000Z</news:publication_date>
      <news:title>Microsoft Threat Intelligence: Helpdesk impersonation via Teams used for cross-tenant access and data exfiltration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sox28t/how_to_pivot_to_cybersecurity_from_being_sysadmin/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:01:50.000Z</news:publication_date>
      <news:title>How to pivot to cybersecurity from being sysadmin / network engineer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/18/crosstenant-helpdesk-impersonation-data-exfiltration-human-operated-intrusion-playbook/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T12:55:45.000Z</news:publication_date>
      <news:title>Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sowoo5/good_day_folks_please_refer_a_scrm_program_that/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T12:45:10.000Z</news:publication_date>
      <news:title>Good day folks ! Please refer a SCRM program that can provide a full report with ( Geopolitical, FOCI, cyber security posture, business dev, financial and legal court filings for a vendor ) a solution that can write the report for me NIST-800-161</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sow9z4/why_do_most_realworld_breaches_still_come_down_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T12:26:09.000Z</news:publication_date>
      <news:title>Why do most real-world breaches still come down to simple mistakes?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sovmcj/common_pricetags_vulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T11:54:22.000Z</news:publication_date>
      <news:title>Common pricetags vulnerable</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sou4zz/mad_bugs_even_cat_readmetxt_is_not_safe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:35:38.000Z</news:publication_date>
      <news:title>MAD Bugs: Even "cat readme.txt" is not safe</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/tycoon-2fa-loses-phishing-kit-crown-amid-surge-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:30:00.000Z</news:publication_date>
      <news:title>Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-it-takes-2-minutes-to-hack-the-eus-new-age-verification-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:30:00.000Z</news:publication_date>
      <news:title>It Takes 2 Minutes to Hack the EU’s New Age-Verification App</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sotxf6/the_smart_tv_in_your_living_room_is_a_node_in_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:23:53.000Z</news:publication_date>
      <news:title>The Smart TV in Your Living Room Is a Node in the AI Scraping Economy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sotb5t/tamperedchef_within_gta_vfivem_mods_report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T09:48:33.000Z</news:publication_date>
      <news:title>TamperedChef within GTA V/FiveM mods report - ModsHub / Network Graphics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sosim2/why_is_it_so_hard_to_find_the_right_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T09:01:57.000Z</news:publication_date>
      <news:title>Why is it so hard to find the right cybersecurity course?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sosedv/things_i_wish_i_knew_before_starting_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T08:54:49.000Z</news:publication_date>
      <news:title>Things I wish I knew before starting in cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/1374m-hack-shuts-down-sanctioned-grinex.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:59:00.000Z</news:publication_date>
      <news:title>$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soreu0/is_cybersecurity_still_a_good_career_option_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:55:49.000Z</news:publication_date>
      <news:title>Is cybersecurity still a good career option in 2026?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soqyxw/prototype_adaptive_deception_environment_that/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:30:07.000Z</news:publication_date>
      <news:title>Prototype: Adaptive deception environment that models attacker behaviour and generates dynamic decoys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soqmir/postquantum_cryptography_migration_at_meta/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:10:41.000Z</news:publication_date>
      <news:title>Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1soq002/recently_leaked_windows_zerodays_now_exploited_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T06:35:45.000Z</news:publication_date>
      <news:title>Recently leaked Windows zero-days now exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sopwww/payouts_king_ransomware_uses_qemu_vms_to_bypass/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T06:30:57.000Z</news:publication_date>
      <news:title>Payouts King ransomware uses QEMU VMs to bypass endpoint security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T06:01:00.000Z</news:publication_date>
      <news:title>Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet</news:title>
    </news:news>
  </url>
</urlset>