<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1st49g3/malware_to_data_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T01:13:03.000Z</news:publication_date>
      <news:title>Malware to Data Breach.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st3q65/tool_recommendations_for_vulncve_research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:49:00.000Z</news:publication_date>
      <news:title>Tool recommendations for vuln/CVE research</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st3iql/t0xique_password_story/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:39:31.000Z</news:publication_date>
      <news:title>T0XIQUE PASSWORD STORY</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st2wrg/reversing_the_gentlemen_ransomware_gogarble/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:12:16.000Z</news:publication_date>
      <news:title>Reversing The Gentlemen ransomware (Go/Garble) — ephemeral X25519 keys persist in go routine stacks, enabling full decryption.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st1sjp/i_passed_the_technical_interview_and_am_on_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:24:07.000Z</news:publication_date>
      <news:title>I passed the technical Interview and am on the last one with a VP but I still don't feel ready / imposter.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1st1hq2/static_analysis_of_paypal_android_app_reveals_13/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:11:21.000Z</news:publication_date>
      <news:title>Static analysis of PayPal Android app reveals 13 embedded SDKs including Meta SDK and Adobe Analytics inside a payment app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sszu4j/i_wish_i_started_earlier/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:05:28.000Z</news:publication_date>
      <news:title>I wish I started earlier</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1ssyvow/thousands_of_live_secrets_found_across_four_cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T21:28:54.000Z</news:publication_date>
      <news:title>Thousands of Live Secrets Found Across Four Cloud Development Environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/apple-fixes-ios-bug-that-retained-deleted-notification-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:58:58.000Z</news:publication_date>
      <news:title>Apple fixes iOS bug that retained deleted notification data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/gentlemen-rapidly-rise-ransomware</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:51:55.000Z</news:publication_date>
      <news:title>'The Gentlemen' Rapidly Rises to Ransomware Prominence</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/north-korean-hackers-siphon-12-million-from-crypto-users</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:48:00.000Z</news:publication_date>
      <news:title>North Korean hackers siphon more than $12 million from crypto users in sprawling campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssxl39/cisa_director_pick_sean_plankey_withdraws_his/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:39:51.000Z</news:publication_date>
      <news:title>CISA director pick Sean Plankey withdraws his nomination</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/cisa-director-pick-sean-plankey-withdraws-his-nomination/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:29:41.000Z</news:publication_date>
      <news:title>CISA director pick Sean Plankey withdraws his nomination</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssx4e5/researcher_claims_claude_desktop_installs_spyware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:22:37.000Z</news:publication_date>
      <news:title>Researcher claims Claude Desktop installs “spyware” on macOS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/house-republicans-release-national-privacy-legislation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:15:56.000Z</news:publication_date>
      <news:title>House Republicans roll out national privacy bill</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sswp5r/france_confirms_data_breach_at_government_agency/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:07:26.000Z</news:publication_date>
      <news:title>France confirms data breach at government agency that manages citizens' IDs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sswok7/pack2theroot_cve202641651_crossdistro_local/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:06:48.000Z</news:publication_date>
      <news:title>Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-mirai-campaign-exploits-rce-flaw-in-eol-d-link-routers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:04:46.000Z</news:publication_date>
      <news:title>New Mirai campaign exploits RCE flaw in EoL D-Link routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/google-workspace-intelligence-feature/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:55:20.000Z</news:publication_date>
      <news:title>Google’s Workspace Intelligence promises privacy while running on your data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssw2jr/summer_plans_direction_advice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:44:31.000Z</news:publication_date>
      <news:title>Summer Plans / Direction Advice</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssv41q/att_data_vendor_breach_42026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:09:49.000Z</news:publication_date>
      <news:title>ATT data vendor breach 4/2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssuveh/courses_on_grc_iso_27001_soc2_etc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:01:20.000Z</news:publication_date>
      <news:title>Courses on GRC, iso 27001, SOC2 etc….</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/hackers-venezuela-wiper-malware-oil</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:00:00.000Z</news:publication_date>
      <news:title>Hackers deployed wiper malware in destructive attacks on Venezuela’s energy sector</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:52:29.000Z</news:publication_date>
      <news:title>Kyber ransomware gang toys with post-quantum encryption on Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssugyy/i_got_this_mail_and_i_am_worried_please_help_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:47:01.000Z</news:publication_date>
      <news:title>I got this mail and I am worried. Please help me.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sstlmp/just_out_of_curiosity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:16:10.000Z</news:publication_date>
      <news:title>just out of curiosity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sst5g4/the_boy_that_cried_mythos_verification_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:00:42.000Z</news:publication_date>
      <news:title>The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic [ What Mythos 200+ pages raport really said ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:55:00.000Z</news:publication_date>
      <news:title>Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:33:00.000Z</news:publication_date>
      <news:title>Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/22/dont-wait-for-a-patch-mitigate-redsun-risk-in-microsoft-defender-today</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:12:34.000Z</news:publication_date>
      <news:title>Don’t Wait for a Patch. Mitigate RedSun Zero-Day Risk in Microsoft Defender Today</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/22/ai-powered-defense-for-an-ai-accelerated-threat-landscape/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:00:00.000Z</news:publication_date>
      <news:title>AI-powered defense for an AI-accelerated threat landscape</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssr072/uk_government_says_100_countries_have_spyware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:46:12.000Z</news:publication_date>
      <news:title>UK government says 100 countries have spyware that can hack people's phones</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/france-titres-online-portal-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:44:54.000Z</news:publication_date>
      <news:title>Cyberattack on French government agency triggers phishing alert for users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/hypersonic-supply-chain-attacks-one-solution-that-didnt-need-to-know-the-payload/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:44:53.000Z</news:publication_date>
      <news:title>Hypersonic Supply Chain Attacks: One Solution That Didn’t Need to Know the Payload</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/macos-lotl-techniques-enterprise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:30:00.000Z</news:publication_date>
      <news:title>MacOS Native Tools Enable Stealthy Enterprise Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/threat-landscape/ncsc-flags-widening-gap-between-cyber-threats-and-national-resilience-urges-action-as-ai-fuels-rise-in-disruptive-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:11:32.000Z</news:publication_date>
      <news:title>NCSC flags widening gap between cyber threats and national resilience, urges action as AI fuels rise in disruptive attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/supreme-court-geofence-warrants-chatrie-case/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:08:26.000Z</news:publication_date>
      <news:title>The Supreme Court is about to decide how far geofence warrants can go</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/threat-landscape/zerofox-data-shows-ransomware-stabilizing-at-scale-with-manufacturing-absorbing-nearly-one-in-five-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:07:00.000Z</news:publication_date>
      <news:title>ZeroFox data shows ransomware stabilizing at scale, with manufacturing absorbing nearly one in five attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/bridgebreak-reveals-22-vulnerabilities-in-serial-to-ip-converters-enabling-disruption-and-lateral-movement-across-ot/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:02:10.000Z</news:publication_date>
      <news:title>BRIDGE:BREAK reveals 22 vulnerabilities in serial-to-IP converters enabling disruption and lateral movement across OT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/ai-tools-are-helping-mediocre-north-korean-hackers-steal-millions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:00:00.000Z</news:publication_date>
      <news:title>AI Tools Are Helping Mediocre North Korean Hackers Steal Millions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/regulation-standards-and-compliance/australias-cisc-tightens-cyber-reporting-rules-to-capture-ai-driven-incidents-in-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:59:24.000Z</news:publication_date>
      <news:title>Australia’s CISC tightens cyber reporting rules to capture AI-driven incidents in critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssp6ov/mozilla_anthropics_mythos_found_271_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:41:37.000Z</news:publication_date>
      <news:title>Mozilla: Anthropic's Mythos found 271 security vulnerabilities in Firefox 150</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/french-hacker-cyberattacks-arrest</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:30:00.000Z</news:publication_date>
      <news:title>French police arrest suspected hacker behind dozens of data breaches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:28:00.000Z</news:publication_date>
      <news:title>Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/servicenow-closes-armis-deal-to-extend-ai-powered-cyber-risk-visibility-across-ot-and-iot/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:22:38.000Z</news:publication_date>
      <news:title>ServiceNow closes Armis deal to extend AI-powered cyber risk visibility across OT and IoT</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/spain-dismantles-major-47m-manga-piracy-platform-arrests-four/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:06:34.000Z</news:publication_date>
      <news:title>Spain dismantles major $4.7M manga piracy platform, arrests four</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ncsc-silentglass-a-plugin-stop/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:00:00.000Z</news:publication_date>
      <news:title>NCSC Unveils SilentGlass, a Plug-In Device to Protect Monitors from Cyber-Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/dprk-fake-job-scams-self-propagate-contagious-interview</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:48:05.000Z</news:publication_date>
      <news:title>DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/claude-mythos-mozilla-vulnerabilities-scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:40:09.000Z</news:publication_date>
      <news:title>Claude Mythos finds 271 Firefox flaws, Mozilla believes zero-days are numbered</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/vulnerabilities-threat-research/2026/04/22/oracle-critical-patch-update-april-2026-security-update-review</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:34:25.000Z</news:publication_date>
      <news:title>Oracle Critical Patch Update, April 2026 Security Update Review</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/after-bluesky-mastodon-targeted-in-ddos-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:26:00.000Z</news:publication_date>
      <news:title>After Bluesky, Mastodon Targeted in DDoS Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1ssmyig/reverseengineering_a_targeted_npm_supply_chain/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:21:24.000Z</news:publication_date>
      <news:title>Reverse-engineering a targeted npm supply chain attack with two-stage C2 — full forensic analysis</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssmr2i/how_does_policy_review_work_palo_alto_firewalls/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:13:45.000Z</news:publication_date>
      <news:title>How does policy review work (palo alto firewalls) ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/uk-pledges-90m-for-cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:10:00.000Z</news:publication_date>
      <news:title>UK Pledges £90m for Cybersecurity and Pushes for ‘Resilience Pledge’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssmke6/is_owasp_top_10_llm_08_2025_embedding_and_vector/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:06:55.000Z</news:publication_date>
      <news:title>Is OWASP Top 10 LLM 08 2025 Embedding and Vector Weaknesses Outdated</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssmgfp/the_zerodays_are_numbered_mythos_numbers_are_real/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:02:56.000Z</news:publication_date>
      <news:title>The zero-days are numbered | Mythos numbers are real?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/inside-caller-as-a-service-fraud-the-scam-economy-has-a-hiring-process/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:01:11.000Z</news:publication_date>
      <news:title>Inside Caller-as-a-Service Fraud: The Scam Economy Has a Hiring Process</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/prove-identity-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:50:28.000Z</news:publication_date>
      <news:title>Prove Identity Platform connects verification, authentication, and fraud prevention</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/china-cyber-capabilities-match-us-dutch-intel-says</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:33:00.000Z</news:publication_date>
      <news:title>China’s cyber capabilities now equal to the US, warns Dutch intelligence</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/new-mirai-variants-target-routers-and-dvrs-via-old-flaws/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:24:09.000Z</news:publication_date>
      <news:title>New Mirai variants target routers and DVRs in parallel campaigns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/acronis-genai-protection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:24:08.000Z</news:publication_date>
      <news:title>Acronis GenAI Protection gives MSPs control over AI usage and data risks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sskv9h/lovable_denies_breach_after_bola_flaw_reportedly/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:02:32.000Z</news:publication_date>
      <news:title>Lovable denies breach after BOLA flaw reportedly enabled cross-tenant access to source code and secrets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/silent-subject-phishing-campaigns/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:00:00.000Z</news:publication_date>
      <news:title>Surge in Silent Subject Phishing Attacks Targets VIP Users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:57:42.000Z</news:publication_date>
      <news:title>New npm supply-chain attack self-spreads to steal auth tokens</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/most-serious-cyberattacks-against-the-uk-now-from-russia-iran-and-china-cyber-chief-says/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:57:01.000Z</news:publication_date>
      <news:title>Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/elastic-mcp-apps/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:51:51.000Z</news:publication_date>
      <news:title>Elastic MCP Apps bring security and observability workflows into AI tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/UK-cyberattacks-ncsc-china</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:45:00.000Z</news:publication_date>
      <news:title>UK cyber agency handling four major incidents a week as nation-state attacks surge</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/malicious-trading-website-drop-malware-that-hands-over-your-browser-to-attackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:30:02.000Z</news:publication_date>
      <news:title>Malicious trading website drops malware that hands your browser to attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/defense-cyber-strategy-warfare</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:30:00.000Z</news:publication_date>
      <news:title>New Defense Department cyber strategy imminent, official says</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssk0hn/hr_8250_parents_decide_act_would_require_age/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:27:20.000Z</news:publication_date>
      <news:title>H.R. 8250 (Parents Decide Act) would require age verification at the OS level</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-gets-efficiency-mode-for-hardware-constrained-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:24:38.000Z</news:publication_date>
      <news:title>Microsoft Teams to get efficiency mode on PCs with limited resources</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/new-wiper-malware-targeted-venezuelan-energy-sector-prior-to-us-intervention/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:10:28.000Z</news:publication_date>
      <news:title>New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/22/cisa-adds-one-known-exploited-vulnerability-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds One Known Exploited Vulnerability to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/researcher-claims-claude-desktop-installs-spyware-on-macos</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:53:11.000Z</news:publication_date>
      <news:title>Researcher claims Claude Desktop installs “spyware” on macOS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssj4nm/new_gogra_malware_for_linux_uses_microsoft_graph/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:48:14.000Z</news:publication_date>
      <news:title>New GoGra malware for Linux uses Microsoft Graph API for comms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/mirai-botnet-targets-flaw-in-discontinued-d-link-routers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:44:07.000Z</news:publication_date>
      <news:title>Mirai Botnet Targets Flaw in Discontinued D-Link Routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssiqvs/where_to_find_entry_level_internjobs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:30:09.000Z</news:publication_date>
      <news:title>Where to find entry level intern/jobs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/are-sboms-failing-supply-chain-attacks-rise-as-security-teams-struggle-with-sbom-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:30:00.000Z</news:publication_date>
      <news:title>Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/progress-waf-bypass-cve-2026-21876/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:29:19.000Z</news:publication_date>
      <news:title>Progress Software fixes sneaky WAF bypass vulnerability (CVE-2026-21876)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssipz9/guidance_on_certifications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:29:02.000Z</news:publication_date>
      <news:title>Guidance on Certifications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/claude-mythos-finds-271-firefox-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:27:46.000Z</news:publication_date>
      <news:title>Claude Mythos Finds 271 Firefox Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1ssim2j/19_confirmed_repos_tied_to_the_same_github/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:23:42.000Z</news:publication_date>
      <news:title>19 confirmed repos tied to the same GitHub malware campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssihei/need_opinions_on_certs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:17:22.000Z</news:publication_date>
      <news:title>Need Opinions on Certs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/former-ransomware-negotiator/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:00:00.000Z</news:publication_date>
      <news:title>Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/lotus-wiper-malware-targets-venezuelan.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:55:00.000Z</news:publication_date>
      <news:title>Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/north-korean-hackers-use-applescript-clickfix-in-fresh-macos-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:49:52.000Z</news:publication_date>
      <news:title>North Korean Hackers Use AppleScript, ClickFix in Fresh macOS Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/toxic-combinations-when-cross-app.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:41:36.000Z</news:publication_date>
      <news:title>Toxic Combinations: When Cross-App Permissions Stack into Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/tencent-qclaw-ai-agent-windows-macos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:32:02.000Z</news:publication_date>
      <news:title>Tencent’s QClaw AI agent app arrives on Windows and macOS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sshfrk/uploaded_passport_scan_to_a_free_pdf_converter/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:24:01.000Z</news:publication_date>
      <news:title>Uploaded passport scan to a free pdf converter online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-graph-api-code-change-causes-universal-print-share-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:15:09.000Z</news:publication_date>
      <news:title>Microsoft traces Universal Print issues to Graph API code change</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssh7to/microsoft_shipped_a_broken_aspnet_patch/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:11:52.000Z</news:publication_date>
      <news:title>Microsoft Shipped a Broken ASP.NET Patch</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:00:22.000Z</news:publication_date>
      <news:title>When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/cisco-phishing-initial-access-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:00:03.000Z</news:publication_date>
      <news:title>Phishing reclaims the top initial access spot, attackers experiment with AI tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-gogra-malware-for-linux-uses-microsoft-graph-api-for-comms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:00:00.000Z</news:publication_date>
      <news:title>New GoGra malware for Linux uses Microsoft Graph API for comms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/ciso-strategy-ai-real-time-risk-op-ed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:00:00.000Z</news:publication_date>
      <news:title>The AI era demands a different kind of CISO</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/researchers-proxysmart-software-90/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:00:00.000Z</news:publication_date>
      <news:title>Researchers Uncover ProxySmart Software Powering 90+ SIM Farms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-antigravity-in-crosshairs-of-security-researchers-cybercriminals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:53:05.000Z</news:publication_date>
      <news:title>Google Antigravity in Crosshairs of Security Researchers, Cybercriminals</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssgs9r/extending_my_access_abusing_installed_extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:47:30.000Z</news:publication_date>
      <news:title>Extending my access: Abusing installed extensions for post compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/microsoft-onedrive-intelligence-collaboration-updates/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:47:07.000Z</news:publication_date>
      <news:title>OneDrive updates focus on AI, access control, and compliance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1ssgrac/extending_my_access_abusing_installed_extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:45:52.000Z</news:publication_date>
      <news:title>Extending my access: Abusing installed extensions for post compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:29:00.000Z</news:publication_date>
      <news:title>Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssgfik/national_vulnerability_database_tool/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:26:58.000Z</news:publication_date>
      <news:title>National Vulnerability Database Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssfufa/over_1300_microsoft_sharepoint_servers_vulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:53:39.000Z</news:publication_date>
      <news:title>Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssfp3h/microsoft_releases_emergency_patches_for_critical/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:45:21.000Z</news:publication_date>
      <news:title>Microsoft releases emergency patches for critical ASP.NET flaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/oracle-patches-450-vulnerabilities-with-april-2026-cpu/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:41:10.000Z</news:publication_date>
      <news:title>Oracle Patches 450 Vulnerabilities With April 2026 CPU</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-security-updates-for-critical-aspnet-flaw/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:08:16.000Z</news:publication_date>
      <news:title>Microsoft releases emergency patches for critical ASP.NET flaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/uk-faces-a-cyber-perfect-storm-ncsc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:07:00.000Z</news:publication_date>
      <news:title>UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:58:00.000Z</news:publication_date>
      <news:title>Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssev8c/whats_stopping_bec_at_the_email_layer_when_theres/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:56:17.000Z</news:publication_date>
      <news:title>What's stopping BEC at the email layer when there's no payload to detect?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sseeol/vibe_coding_is_shipping_vulnerabilities_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:28:50.000Z</news:publication_date>
      <news:title>Vibe coding is shipping vulnerabilities to production. Here's what the data actually shows.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:16:00.000Z</news:publication_date>
      <news:title>Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sse1r3/have_you_ever_watched_a_threat_actor_accidentally/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:07:31.000Z</news:publication_date>
      <news:title>Have you ever watched a threat actor accidentally dox themselves in real-time? 👀</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/over-1-300-microsoft-sharepoint-servers-vulnerable-to-ongoing-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T06:53:02.000Z</news:publication_date>
      <news:title>Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssc2jq/unused_tech_cybersecurity_student_needs_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T05:17:32.000Z</news:publication_date>
      <news:title>Unused tech - Cybersecurity student needs help consolidating/upgrading.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssbzdl/coinbase_quantum_advisory_council_publishes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T05:12:57.000Z</news:publication_date>
      <news:title>Coinbase Quantum Advisory Council Publishes Position Paper on Quantum Computing and Blockchain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/pentagi-autonomous-ai-penetration-testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T05:00:31.000Z</news:publication_date>
      <news:title>PentAGI: Open-source autonomous AI penetration testing system</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssbpft/22_flaws_in_obscure_bridge_devices_could_let/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:58:51.000Z</news:publication_date>
      <news:title>22 flaws in obscure “bridge” devices could let attackers mess with real-world systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ssbk30/pgserve_1111_through_1113_are_compromised_and_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:51:00.000Z</news:publication_date>
      <news:title>pgserve 1.1.11 through 1.1.13 are compromised, and the code is surprisingly clean</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/apple-intelligence-token-vulnerability-serpent-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:30:08.000Z</news:publication_date>
      <news:title>Apple Intelligence flaw kept stolen tokens reusable on another device</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/22/financial-sector-cyber-threats-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:00:16.000Z</news:publication_date>
      <news:title>Shadow AI, deepfakes, and supply chain compromise are rewriting the financial sector threat playbook</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss8e0a/ai_governance_is_moving_into_the_machinery/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T02:21:08.000Z</news:publication_date>
      <news:title>AI Governance Is Moving Into the Machinery</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32918</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T02:00:03.000Z</news:publication_date>
      <news:title>ISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32888</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T00:03:04.000Z</news:publication_date>
      <news:title>&amp;#x5b;Guest Diary&amp;#x5d; Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52510</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T00:00:00.000Z</news:publication_date>
      <news:title>[local] AVAST Antivirus 25.11 - Unquoted Service Path</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52511</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] WordPress Plugin  5.2.0 - Broken Access Control</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52512</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T00:00:00.000Z</news:publication_date>
      <news:title>[local] Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/ai-hype-vs-reality</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T00:00:00.000Z</news:publication_date>
      <news:title>AI Hype vs. Reality: Is AI Really Rewriting the Vulnerability Equation?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss4qln/my_team_needs_to_get_started_with_ctem_but_i/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:40:49.000Z</news:publication_date>
      <news:title>My team needs to get started with CTEM, but I genuinely don't know what to do. What did your first 90 days look like?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss4n59/looking_for_cyber_advice_first_cybersecurity_job/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:36:38.000Z</news:publication_date>
      <news:title>Looking for cyber advice/ first cybersecurity job</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss44lh/how_often_do_clients_ask_for_soc_2_before_they/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:15:00.000Z</news:publication_date>
      <news:title>How often do clients ask for SOC 2 before they actually need it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss3y67/anthropics_mythos_model_accessed_by_unauthorized/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:07:51.000Z</news:publication_date>
      <news:title>Anthropic's Mythos model accessed by unauthorized users, Bloomberg News reports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss3v48/early_version_of_eus_age_verification_app_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:04:29.000Z</news:publication_date>
      <news:title>Early version of EU's age verification app is apparently hackable in less than two minutes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss3jx6/lab_review/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:52:16.000Z</news:publication_date>
      <news:title>Lab review</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1ss3e38/vercel_oauth_breach_analysis_contextai_compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:45:42.000Z</news:publication_date>
      <news:title>Vercel OAuth breach analysis: Context.ai compromise, MITRE T1199 trust-chain attack, IOC for Google Workspace admins</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1ss3ct3/free_ai_detection_app_designed_specifically_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:44:18.000Z</news:publication_date>
      <news:title>Free AI Detection app designed specifically for Social Media posts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss2y2u/cybercx_academy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:27:41.000Z</news:publication_date>
      <news:title>CyberCX academy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss2xn2/an_alternative_to_identity_at_the_edge/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:27:12.000Z</news:publication_date>
      <news:title>An Alternative to Identity at the Edge</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1ss24rn/sentinelones_credential_abuse_report_is_bleak/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T21:56:18.000Z</news:publication_date>
      <news:title>SentinelOne's credential abuse report is bleak</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss242a/our_company_just_got_chatgpt_enterprise_i/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T21:55:34.000Z</news:publication_date>
      <news:title>Our company just got ChatGPT Enterprise. I realized any employee can paste client data into it and we'd never know. How is everyone handling this?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T21:46:04.000Z</news:publication_date>
      <news:title>French govt agency confirms breach as hacker offers to sell data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/insider-threats/ransomware-negotiator-pleads-guilty-blackcat-scheme</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T21:12:43.000Z</news:publication_date>
      <news:title>Ransomware Negotiator Pleads Guilty to BlackCat Scheme</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/digitalmint-ransomware-negotiator-angelo-martino-guilty-plea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T21:03:58.000Z</news:publication_date>
      <news:title>Former DigitalMint ransomware negotiator pleads guilty to extortion scheme</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/oracle-april-2026-critical-patch-update-addresses-241-cves</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T20:59:27.000Z</news:publication_date>
      <news:title>Oracle April 2026 Critical Patch Update Addresses 241 CVEs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ss0dyw/iran_claims_us_used_backdoors_in_networking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T20:51:48.000Z</news:publication_date>
      <news:title>Iran claims US used backdoors in networking equipment</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srzo0h/job_interview_in_2_days_installation_technician/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T20:26:14.000Z</news:publication_date>
      <news:title>Job interview in 2 days - Installation Technician</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srzmi7/bluerock_found_critical_rce_in_awss/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T20:24:44.000Z</news:publication_date>
      <news:title>BlueRock found critical RCE in AWS’s aws-diagram-mcp-server: exec() denylist bypass (HackerOne #3557138)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sryptw/quantum_computers_are_not_a_threat_to_128bit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:52:21.000Z</news:publication_date>
      <news:title>Quantum Computers Are Not a Threat to 128-bit Symmetric Keys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sryb1k/i_am_down_to_my_final_interview_and_im_nervous/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:37:36.000Z</news:publication_date>
      <news:title>I am down to my final interview and I'm nervous</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srxz5a/cybersecurity_statistics_of_the_week_april_13th/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:25:35.000Z</news:publication_date>
      <news:title>Cybersecurity statistics of the week (April 13th - April 19th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/thunderbird-150-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:19:57.000Z</news:publication_date>
      <news:title>Thunderbird 150 arrives with encrypted message search and OpenPGP improvements</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/exploits-turn-windows-defender-attacker-tool</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:12:40.000Z</news:publication_date>
      <news:title>Exploits Turn Windows Defender into Attacker Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srxc83/bls_cybersecurity_job_outlook_vs_reality/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:03:06.000Z</news:publication_date>
      <news:title>BLS Cybersecurity Job Outlook vs reality</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/the-com-scattered-spider-hacker-tyler-robert-buchanan-guilty-plea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:51:01.000Z</news:publication_date>
      <news:title>Scottish man pleads guilty to attack spree that created Scattered Spider’s notoriety</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/lawmakers-ponder-terrorism-designations-homicide-charges-over-hospital-ransomware-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:49:46.000Z</news:publication_date>
      <news:title>Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srwqpa/is_bug_bounty_actually_worth_it_for_new_comers_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:42:24.000Z</news:publication_date>
      <news:title>Is bug bounty actually worth it for new comers in 2026? Need real talk, not motivation.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srwp3b/title_spvm_gross_negligence_i_handed_pdq_20_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:40:49.000Z</news:publication_date>
      <news:title>Title: SPVM gross negligence: I handed PDQ 20 a frozen extortion node and a human trafficking threat. They laughed and closed the file</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-lotus-data-wiper-used-against-venezuelan-energy-utility-firms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:38:40.000Z</news:publication_date>
      <news:title>New Lotus data wiper used against Venezuelan energy, utility firms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/mozilla-used-anthropics-mythos-to-find-271-bugs-in-firefox/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:30:00.000Z</news:publication_date>
      <news:title>Mozilla Used Anthropic’s Mythos to Find and Fix 151 Bugs in Firefox</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:18:00.000Z</news:publication_date>
      <news:title>SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/virtualbox-7-2-8-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:16:39.000Z</news:publication_date>
      <news:title>VirtualBox 7.2.8 is out with Linux kernel 7.0 support and crash fixes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srvr5x/how_to_build_a_career_in_hardware_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:08:15.000Z</news:publication_date>
      <news:title>How to build a career in hardware security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srvol6/two_new_critical_spinnaker_vulns_allow_rce_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:05:51.000Z</news:publication_date>
      <news:title>Two new critical Spinnaker vulns allow RCE and production access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sruoty/behavior_validation_for_agentic_ai_applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:32:46.000Z</news:publication_date>
      <news:title>Behavior validation for Agentic AI Applications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sru854/i_discovered_a_covert_wifienabled_camera/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:17:04.000Z</news:publication_date>
      <news:title>“I discovered a covert Wi-Fi–enabled camera concealed inside a power adapter in a hotel room. The device was transmitting live footage to an overseas server (likely China-based). No cctv footage, used vpn, hotel denies their involvement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srteqo/hacker_como_se_tornar_um/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:49:31.000Z</news:publication_date>
      <news:title>Hacker - como se tornar um ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/uk-regulator-to-probe-telegram-over-csam-allegations</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:46:00.000Z</news:publication_date>
      <news:title>UK regulator to probe Telegram, teen chat sites for potential child safety violations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/meta-is-sued-over-scam-ads-on-facebook-and-instagram/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:24:41.000Z</news:publication_date>
      <news:title>Meta Is Sued Over Scam Ads on Facebook and Instagram</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/ssh-brings-privx-ot-to-nokia-industrial-edge-to-secure-remote-access-in-ot-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:15:48.000Z</news:publication_date>
      <news:title>SSH brings PrivX OT to Nokia Industrial Edge to secure remote access in OT environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/txone-introduces-stellar-discover-to-extend-ot-security-from-discovery-to-risk-insight/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:15:14.000Z</news:publication_date>
      <news:title>TXOne introduces Stellar Discover to extend OT security from discovery to risk insight</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/industrial-defender-partners-with-kyron-to-boost-ot-resilience-and-nis2-readiness-in-france/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:14:56.000Z</news:publication_date>
      <news:title>Industrial Defender partners with KYrON to boost OT resilience and NIS2 readiness in France</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/semperis-extends-purple-knight-identity-security-assessment-tool-to-us-federal-defense-gcc-high-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:14:37.000Z</news:publication_date>
      <news:title>Semperis extends Purple Knight identity security assessment tool to US federal, defense GCC High environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srs3mh/who_is_rasoul_jalili_the_socalled_father_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:04:07.000Z</news:publication_date>
      <news:title>Who is Rasoul Jalili, the So-Called “Father of Filtering” of the Islamic Republic?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:03:09.000Z</news:publication_date>
      <news:title>Detection strategies across cloud and identities against infiltrating IT workers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/trojanized-android-handle-nfc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:00:00.000Z</news:publication_date>
      <news:title>Trojanized Android App Fuels New Wave of NFC Fraud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:46:00.000Z</news:publication_date>
      <news:title>22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/surge-bomgar-rmm-exploitation-demonstrates-supply-chain-risk</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:29:17.000Z</news:publication_date>
      <news:title>Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srqrcg/android_moto_5g/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:18:44.000Z</news:publication_date>
      <news:title>Android Moto 5G+</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/ransomware-negotiator-blackcat-alphv-group/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:02:06.000Z</news:publication_date>
      <news:title>Ransomware negotiator admits role in attacks he was hired to resolve</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/google-fixes-critical-rce-flaw-ai-based-antigravity-tool</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:00:50.000Z</news:publication_date>
      <news:title>Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srq47h/p4wned_how_insecure_defaults_in_perforce_expose/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:57:42.000Z</news:publication_date>
      <news:title>P4WNED: How Insecure Defaults in Perforce Expose Source Code Across the Internet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:53:59.000Z</news:publication_date>
      <news:title>‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srpyuj/p4wned_how_insecure_defaults_in_perforce_expose/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:52:27.000Z</news:publication_date>
      <news:title>P4WNED: How Insecure Defaults in Perforce Expose Source Code Across the Internet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srpyms/is_dlp_dspm_evolving/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:52:15.000Z</news:publication_date>
      <news:title>Is DLP / DSPM evolving?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srpwfs/i_needed_a_replacement_for_paul_jerimys_roadmap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:50:01.000Z</news:publication_date>
      <news:title>I needed a replacement for Paul Jerimy's roadmap so I built one for my students</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/third-us-security-expert-admits-helping-ransomware-gang/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:44:24.000Z</news:publication_date>
      <news:title>Third US Security Expert Admits Helping Ransomware Gang</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srpp79/runtime_security_for_ai_agents_is_becoming_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:42:54.000Z</news:publication_date>
      <news:title>Runtime security for AI agents is becoming a practical defense problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/ransomware-negotiator-pleads-guilty-to.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:00.000Z</news:publication_date>
      <news:title>Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srp248/white_house_integrating_anthropics_mythos_ai_into/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:19:39.000Z</news:publication_date>
      <news:title>White House integrating Anthropic’s Mythos AI into federal cybersecurity strategy to harden critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srot2i/webpage_takedown/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:10:30.000Z</news:publication_date>
      <news:title>Webpage takedown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/dozens-of-malicious-crypto-apps-land-in-apple-app-store/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:05:01.000Z</news:publication_date>
      <news:title>Dozens of Malicious Crypto Apps Land in Apple App Store</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/fake-google-antigravity-downloads-are-stealing-accounts-in-minutes</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:04:51.000Z</news:publication_date>
      <news:title>Fake Google Antigravity downloads are stealing accounts in minutes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/stopping-fraud-at-each-stage-of-the-customer-journey-without-adding-friction/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:02:12.000Z</news:publication_date>
      <news:title>Stopping Fraud at Each Stage of the Customer Journey Without Adding Friction</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/gentlemen-ransomware-rapid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:00:00.000Z</news:publication_date>
      <news:title>The Gentlemen Ransomware Expands With Rapid Affiliate Growth</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/uk-probes-telegram-teen-chat-sites-over-csam-sharing-concerns/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:49:10.000Z</news:publication_date>
      <news:title>UK probes Telegram, teen chat sites over CSAM sharing concerns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sro7tb/do_users_rage_on_you_after_failing_phishing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:48:32.000Z</news:publication_date>
      <news:title>Do users rage on you after failing phishing campaign? "I didn't click the link" etc?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sro7g5/agentic_ai_is_now_the_1_attack_surface_nobody_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:48:11.000Z</news:publication_date>
      <news:title>Agentic AI is now the #1 attack surface nobody is talking about in enterprise SOCs — thoughts?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/eu-targets-russian-propaganda-networks-sanctions</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:48:00.000Z</news:publication_date>
      <news:title>EU targets two Russian propaganda networks with new sanctions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srnv4f/cisa_flags_new_sdwan_flaw_as_actively_exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:35:14.000Z</news:publication_date>
      <news:title>CISA flags new SD-WAN flaw as actively exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/british-national-scattered-spider-guilty-sms-phishing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:16:47.000Z</news:publication_date>
      <news:title>Scattered Spider hacker pleads guilty to stealing $8 million in cryptocurrency</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cloud-platform-vercel-says-company-breached-through-ai-tool</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:10:00.000Z</news:publication_date>
      <news:title>Cloud platform Vercel says company breached through third-party AI tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/5-places-where-mature-socs-keep-mttr.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:00:00.000Z</news:publication_date>
      <news:title>5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/unchecked-ai-agents-cause/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:00:00.000Z</news:publication_date>
      <news:title>Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/real-apple-notifications-are-being-used-to-drive-tech-support-scams</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:59:31.000Z</news:publication_date>
      <news:title>Real Apple notifications are being used to drive tech support scams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/ivanti-neurons-ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:56:11.000Z</news:publication_date>
      <news:title>Ivanti Neurons AI automates IT operations, reducing manual work and security risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/silobreaker-mimir-adds-agentic-ai-to-intelligence-workflows-with-governance-and-transparency/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:39:41.000Z</news:publication_date>
      <news:title>Silobreaker Mimir adds agentic AI to intelligence workflows with governance and transparency</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srmfq1/best_cyber_security_course_in_usa/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:38:41.000Z</news:publication_date>
      <news:title>Best Cyber Security Course in USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/unsecured-perforce-servers-expose-sensitive-data-from-major-orgs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:37:49.000Z</news:publication_date>
      <news:title>Unsecured Perforce Servers Expose Sensitive Data From Major Orgs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srmefq/seen_the_cyber_side_of_modern_conflicts_ask/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:37:06.000Z</news:publication_date>
      <news:title>Seen the cyber side of modern conflicts. Ask questions.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-flags-new-sd-wan-flaw-as-actively-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:30:50.000Z</news:publication_date>
      <news:title>CISA flags new SD-WAN flaw as actively exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/openai-chronicle-codex-screen-context-memories/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:25:41.000Z</news:publication_date>
      <news:title>OpenAI’s Chronicle feature lets Codex read your screen, raising privacy concerns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srlvkn/ai_models_are_now_finding_bank_vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:14:38.000Z</news:publication_date>
      <news:title>AI Models Are Now Finding Bank Vulnerabilities Faster Than Regulators Can Respond</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/progress-patches-multiple-vulnerabilities-in-moveit-waf-loadmaster/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:14:26.000Z</news:publication_date>
      <news:title>Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1srluxa/iocx_v070_deterministic_heuristics_adversarial_pe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:13:50.000Z</news:publication_date>
      <news:title>IOCX v0.7.0 — deterministic heuristics + adversarial PE samples</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srlroo/sim_farms_as_a_service_a_shared_control_plane/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:43.000Z</news:publication_date>
      <news:title>SIM Farms as a Service: A Shared Control Plane Spanning 87 Farms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srlroo/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:43.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srlrbd/a_single_platform_powers_sim_farm_proxy_networks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:15.000Z</news:publication_date>
      <news:title>A single platform powers SIM farm proxy networks across 17 countries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srlrbd/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:09:15.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/chinese-apt-indian-banks-korean-policy</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:00:00.000Z</news:publication_date>
      <news:title>Chinese APT Targets Indian Banks, Korean Policy Circles</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srli4x/secure_boot_cert_renewal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:57:55.000Z</news:publication_date>
      <news:title>Secure Boot Cert renewal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srl68g/meetups_in_navi_mumbai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:43:04.000Z</news:publication_date>
      <news:title>Meetups in Navi Mumbai?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/no-exploit-needed-how-attackers-walk.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:30:00.000Z</news:publication_date>
      <news:title>No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1srks4e/we_analysed_almost_100_uk_charity_websites_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:24:24.000Z</news:publication_date>
      <news:title>We analysed almost 100 UK charity websites and found that ~1 in 6 are running vulnerable JavaScript dependencies.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/organizations-warned-of-exploited-cisco-kentico-zimbra-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:19:45.000Z</news:publication_date>
      <news:title>Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/actively-exploited-apache-activemq-flaw-impacts-6-400-servers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:17:51.000Z</news:publication_date>
      <news:title>Actively exploited Apache ActiveMQ flaw impacts 6,400 servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkl9u/thinking_about_a_pivot_into_security_leadership/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:14:55.000Z</news:publication_date>
      <news:title>Thinking about a pivot into security leadership</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkig6/clearwater_library_computer_disruption_leads_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:11:01.000Z</news:publication_date>
      <news:title>Clearwater library computer disruption leads to felony charge</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkdae/misp_events_deletion/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:03:42.000Z</news:publication_date>
      <news:title>MISP events deletion?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srkcyx/appsec_e_devsecops/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:03:16.000Z</news:publication_date>
      <news:title>AppSec e DevSecOps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/data-breaches-at-healthcare-organizations-in-illinois-and-texas-affect-600000/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:02:29.000Z</news:publication_date>
      <news:title>Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srk8me/how_can_i_start_my_path_in_soc_analysis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:57:38.000Z</news:publication_date>
      <news:title>How can I start my path in SOC analysis</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srk7l6/how_attackers_are_actually_getting_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:56:11.000Z</news:publication_date>
      <news:title>How Attackers Are Actually Getting In</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/ngate-campaign-targets-brazil.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:40:00.000Z</news:publication_date>
      <news:title>NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srjtur/why_forensic_readiness_is_emerging_as_a_real/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:36:08.000Z</news:publication_date>
      <news:title>Why forensic readiness is emerging as a real enterprise security market</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srjm74/hi_all_i_am_currently_in_a_grc_role_at_one_of_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:24:54.000Z</news:publication_date>
      <news:title>Hi all, I am currently in a GRC role at one of the top universities in EU. I in this post want some guidance on how do I transition into red teaming roles. Any guidance on this will be extremely helpful.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:22:00.000Z</news:publication_date>
      <news:title>Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/vect-formalizes-breachforums-and-teampcp-alliance-to-push-model-for-industrialized-ransomware-scale-raas-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:18:47.000Z</news:publication_date>
      <news:title>Vect formalizes BreachForums and TeamPCP alliance to push model for industrialized ransomware, scale RaaS operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/darktrace-identifies-zionsiphon-malware-engineered-for-ot-disruption-in-israeli-water-sector-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:15:48.000Z</news:publication_date>
      <news:title>Darktrace identifies ZionSiphon malware engineered for OT disruption in Israeli water sector environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/mobile/2026/04/android-17-ends-all-or-nothing-access-to-your-contacts</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:12:27.000Z</news:publication_date>
      <news:title>Android 17 ends all-or-nothing access to your contacts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:12:21.000Z</news:publication_date>
      <news:title>Former ransomware negotiator pleads guilty to BlackCat attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/cisa/cisa-warns-organizations-of-supply-chain-compromise-in-axios-npm-package-delivering-remote-access-trojan/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:11:54.000Z</news:publication_date>
      <news:title>CISA warns organizations of supply chain compromise in Axios npm package delivering remote access trojan</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/290-million-kelp-dao-crypto-heist-blamed-on-north-korea/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:02:09.000Z</news:publication_date>
      <news:title>$290 Million Kelp DAO Crypto Heist Blamed on North Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/they-built-privacy-tool-grapheneos-now-sworn-enemies/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:00:00.000Z</news:publication_date>
      <news:title>They Built a Legendary Privacy Tool. Now They’re Sworn Enemies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/anthropic-mythos-vulnerability-discovery-op-ed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:00:00.000Z</news:publication_date>
      <news:title>Mythos can find the vulnerability. It can’t tell you what to do about it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srj393/ai_prompt_injection_the_new_security_nightmare/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:55:55.000Z</news:publication_date>
      <news:title>AI Prompt Injection: The New Security Nightmare</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srj1qm/full_day_technical_test_for_a_penetration_tester/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:53:28.000Z</news:publication_date>
      <news:title>Full day technical test for a penetration tester role - is that normal?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sriofz/first_cyber_sec_analyst_job_interview_with_asda_uk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:32.000Z</news:publication_date>
      <news:title>First cyber sec analyst job interview with Asda (UK).</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/vercel-cyber-incident-threat-actor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:10:00.000Z</news:publication_date>
      <news:title>Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sri8i7/research_microsoft_meta_google_shamelessly_track/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:05:30.000Z</news:publication_date>
      <news:title>Research: Microsoft, Meta, Google shamelessly track you even if you opt out</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/ngate-android-malware-uses-handypay-nfc-app-to-steal-card-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:00:00.000Z</news:publication_date>
      <news:title>NGate Android malware uses HandyPay NFC app to steal card data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.welivesecurity.com/en/eset-research/new-ngate-variant-hides-in-a-trojanized-nfc-payment-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T08:55:00.000Z</news:publication_date>
      <news:title>New NGate variant hides in a trojanized NFC payment app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/north-korean-blamed-290m-kelpdao/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T08:30:00.000Z</news:publication_date>
      <news:title>North Korean Blamed for $290m KelpDAO Crypto Heist</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srgsts/in_my_recent_projects_i_dont_rely_on_a_single_llm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:38:37.000Z</news:publication_date>
      <news:title>In my recent projects, I don’t rely on a single LLM for security analysis anymore.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32910</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:14:56.000Z</news:publication_date>
      <news:title>A .WAV With A Payload, (Tue, Apr 21st)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/crowdstrike-falcon-platform-achieves-441-percent-roi-in-three-years/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:00:00.000Z</news:publication_date>
      <news:title>CrowdStrike Falcon Platform Achieves 441% ROI in Three Years</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srfst6/i_need_url_of_discord_server_to_learn_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:40:24.000Z</news:publication_date>
      <news:title>I need url of discord server to learn cyber security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:23:00.000Z</news:publication_date>
      <news:title>CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sreu19/vercel_got_exploited_again/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:46:31.000Z</news:publication_date>
      <news:title>Vercel got exploited AGAIN</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sreoqm/how_important_is_reconnaissance_in_bug_bounties/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:38:35.000Z</news:publication_date>
      <news:title>How important is reconnaissance in bug bounties or actual hacking? When you do subdomain enumeration, etc., you only feel like you're getting further away from the actual target.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sreolc/command_execution_via_draganddrop_in_terminal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:38:22.000Z</news:publication_date>
      <news:title>Command Execution via Drag-and-Drop in Terminal Emulators</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srejs1/vertex_solutions_ai_cyber_security_app_vertex/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:31:12.000Z</news:publication_date>
      <news:title>Vertex Solutions AI Cyber Security App (Vertex Security)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srehuk/did_the_vercel_incident_change_your_threat_model/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:28:26.000Z</news:publication_date>
      <news:title>Did the Vercel incident change your threat model?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdltb/can_anybody_offer_a_more_detailed_tutorial_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:42:28.000Z</news:publication_date>
      <news:title>Can anybody offer a more detailed tutorial on using JtR password cracker</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdk07/being_gaslit_about_email_being_e2ee/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:39:49.000Z</news:publication_date>
      <news:title>Being gaslit about email being E2EE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdhrn/pictures_not_allowed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:36:31.000Z</news:publication_date>
      <news:title>Pictures not allowed?!?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdeu5/could_someone_tell_me_realistically_how_grc_is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:32:14.000Z</news:publication_date>
      <news:title>Could someone tell me realistically how GRC is?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/securerouter-encrypted-ai-inference/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:30:41.000Z</news:publication_date>
      <news:title>Researchers build an encrypted routing layer for private AI inference</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srdai8/why_selfattestation_is_the_biggest_weakness_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:25:52.000Z</news:publication_date>
      <news:title>Why "Self-Attestation" is the biggest weakness in current AI Governance (and how to fix it with telemetry)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srd29h/i_have_nothing_to_hide_the_last_words_of_every/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:14:16.000Z</news:publication_date>
      <news:title>“I Have Nothing to Hide” — The Last Words of Every Cybercrime Victim: Cybersecurity 101</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srcw4c/dose_it_only_happen_with_me/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:05:52.000Z</news:publication_date>
      <news:title>Dose it only happen with me ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/21/cybersecurity-jobs-available-right-now-april-21-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:00:53.000Z</news:publication_date>
      <news:title>Cybersecurity jobs available right now: April 21, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/crowdstrike-shadow-AI-visibility-service/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:00:00.000Z</news:publication_date>
      <news:title>Introducing the CrowdStrike Shadow AI Visibility Service</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1src7g4/i_made_a_demo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:32:33.000Z</news:publication_date>
      <news:title>I Made a Demo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1srbffq/browser_extension_inventory_problem/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:56:10.000Z</news:publication_date>
      <news:title>Browser Extension Inventory problem</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sram3b/agentbom_0801_open_security_scanner_for_ai_supply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T02:19:28.000Z</news:publication_date>
      <news:title>Agent-bom 0.80.1: Open security scanner for AI supply chain: agents, MCP, containers, cloud, GPU, and runtime.</news:title>
    </news:news>
  </url>
</urlset>