<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/tiktok-removes-covert-networks-hungary-vote</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:20:00.000Z</news:publication_date>
      <news:title>TikTok removes covert networks ahead of Hungary vote as disinformation concerns grow</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sg3zcp/phishing_via_google_storage_abuse_leading_to_rat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:08:20.000Z</news:publication_date>
      <news:title>Phishing via Google Storage Abuse Leading to RAT Deployment</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sg3kht/a_hack_of_the_la_city_attorneys_office/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:53:15.000Z</news:publication_date>
      <news:title>A hack of the L.A. city attorney’s office compromised 7.7 terabytes of sensitive LAPD records</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sg3i8u/dnsight_open_source_config_driven_cli_dns_auditor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:50:50.000Z</news:publication_date>
      <news:title>dnsight - open source, config driven CLI DNS auditor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/bluehammer-windows-zero-day-exploit-leaked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:48:32.000Z</news:publication_date>
      <news:title>BlueHammer: Windows zero-day exploit leaked</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/ai-led-remediation-crisis-prompts-hackerone-pause-bug-bounties</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:47:32.000Z</news:publication_date>
      <news:title>AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-macos-stealer-campaign-uses-script-editor-in-clickfix-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:55:43.000Z</news:publication_date>
      <news:title>New macOS stealer campaign uses Script Editor in ClickFix attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:43:39.000Z</news:publication_date>
      <news:title>‘We Were Not Ready for This’: Lebanon's Emergency System Is Hanging by a Thread</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sg1co9/i_created_a_library_for_wifi_auditing_on_esp32/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:33:06.000Z</news:publication_date>
      <news:title>I created a library for WiFi auditing on ESP32 based on Marauder</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-exploited-ivanti-epmm-flaw-by-sunday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:15:27.000Z</news:publication_date>
      <news:title>CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/new-chaos-variant-targets-misconfigured.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:51:00.000Z</news:publication_date>
      <news:title>New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/trellix-data-security-capabilities-generative-ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:50:38.000Z</news:publication_date>
      <news:title>Trellix strengthens data security for the GenAI era</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sg01m1/millions_of_health_care_patients_potentially/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:46:31.000Z</news:publication_date>
      <news:title>Millions of health care patients potentially affected by data breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/eurail-reports-data-breach-impacting-over-300000</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:46:00.000Z</news:publication_date>
      <news:title>Passport numbers for more than 300,000 leaked during December Eurail data breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/breach-exposes-lapd-files-city-attorney-systems</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:42:00.000Z</news:publication_date>
      <news:title>Breach exposes sensitive LAPD files stored in city attorney system</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfznvq/offensive_fraud_prevention/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:33:04.000Z</news:publication_date>
      <news:title>Offensive Fraud Prevention</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfzlsc/gaining_experience_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:30:57.000Z</news:publication_date>
      <news:title>Gaining Experience in Cybersecurity</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/13-year-old-bug-in-activemq-lets-hackers-remotely-execute-commands/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:26:40.000Z</news:publication_date>
      <news:title>13-year-old bug in ActiveMQ lets hackers remotely execute commands</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32880</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:15:05.000Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/minnesota-sends-national-guard-after-local-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:10:00.000Z</news:publication_date>
      <news:title>Minnesota governor sends national guard to county after cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfyngq/claude_mythos_and_escaping_the_sandbox/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:57:36.000Z</news:publication_date>
      <news:title>Claude Mythos and escaping the sandbox</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfyiu1/hundreds_of_orgs_compromised_daily_in_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:53:05.000Z</news:publication_date>
      <news:title>Hundreds of orgs compromised daily in Microsoft device code phishing attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfyf1s/hackers_steal_and_leak_sensitive_lapd_police/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:49:26.000Z</news:publication_date>
      <news:title>Hackers steal and leak sensitive LAPD police documents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/two-egyptian-journalists-targeted-spearphishing-campaign</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:44:00.000Z</news:publication_date>
      <news:title>Two prominent Egyptian journalists targeted with elaborate spearphishing campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfy90j/glasswing_gives_50_companies_a_3month_head_start/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:43:31.000Z</news:publication_date>
      <news:title>Glasswing gives 50 companies a 3-month head start on Mythos-class vulnerabilities. What does everyone else do?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:38:03.000Z</news:publication_date>
      <news:title>Hack-for-hire spyware campaign targets journalists in Middle East, North Africa</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/masjesu-botnet-emerges-as-ddos-for-hire.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:30:00.000Z</news:publication_date>
      <news:title>Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfx5nx/psa_if_youre_on_the_receiving_end_of_a_red_team/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:04:57.000Z</news:publication_date>
      <news:title>PSA: if you're on the receiving end of a red team test, the authorization letter protects you too</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfwmtn/i_built_a_forensic_tool_that_explains_why_a_file/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:46:22.000Z</news:publication_date>
      <news:title>I built a forensic tool that explains why a file is malicious</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/fraud-mobile-first-latin-america</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:45:11.000Z</news:publication_date>
      <news:title>Fraud Rockets Higher in Mobile-First Latin America</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfwhtv/common_entra_id_security_assessment_findings_part/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:41:26.000Z</news:publication_date>
      <news:title>Common Entra ID Security Assessment Findings – Part 3: Weak Privileged Identity Management Configuration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/data-leakage-vulnerability-patched-in-openssl/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:37:48.000Z</news:publication_date>
      <news:title>Data Leakage Vulnerability Patched in OpenSSL</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfwc29/snowflake_customers_hit_in_data_theft_attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:35:35.000Z</news:publication_date>
      <news:title>Snowflake customers hit in data theft attacks after SaaS integrator breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfwb2n/a_new_initiative_that_brings_together_amazon_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:34:35.000Z</news:publication_date>
      <news:title>A new initiative that brings together Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks in an effort to secure the world’s most critical software.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/full-sail-university-ibm-cyber-defense-range-aws-cloud-range</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:43:49.000Z</news:publication_date>
      <news:title>Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfushf/quantum_cryptography_and_the_harvest_now_decrypt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:40:12.000Z</news:publication_date>
      <news:title>Quantum cryptography and the "harvest now, decrypt later" problem -- how seriously are organizations taking this?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cia-director-elevated-agency-cyber-espionage-division</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:37:00.000Z</news:publication_date>
      <news:title>CIA director quietly elevated agency’s cyber espionage division</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfuoib/hong_kong_police_can_now_demand_phone_passwords/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:36:04.000Z</news:publication_date>
      <news:title>Hong Kong police can now demand phone passwords under new security rules | Hacker News</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/inside-malwarebytes/2026/04/your-extensions-leak-clues-about-you-so-we-made-sure-browser-guard-doesnt</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:33:18.000Z</news:publication_date>
      <news:title>Your extensions leak clues about you, so we made sure Browser Guard doesn&amp;#8217;t</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/rce-bug-lurked-in-apache-activemq-classic-for-13-years/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:30:27.000Z</news:publication_date>
      <news:title>RCE Bug Lurked in Apache ActiveMQ Classic for 13 Years</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfugo9/russian_gru_exploiting_vulnerable_routers_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:28:17.000Z</news:publication_date>
      <news:title>Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32878</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:23:28.000Z</news:publication_date>
      <news:title>More Honeypot Fingerprinting Scans, (Wed, Apr 8th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/niobium-introduces-the-fog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:22:33.000Z</news:publication_date>
      <news:title>Niobium Introduces The Fog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/remote-workforce/pluralsight-launches-secureready-cybersecurity-teams</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:08:22.000Z</news:publication_date>
      <news:title>Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/is-a-30-000-gpu-good-at-password-cracking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:00:10.000Z</news:publication_date>
      <news:title>Is a $30,000 GPU Good at Password Cracking?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sftjw8/microsoft_blocks_accounts_wireguard_and_veracrypt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:55:09.000Z</news:publication_date>
      <news:title>Microsoft blocks accounts WireGuard and Veracrypt</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sftf4l/atomic_stealer_amos_returns_clickfix_trojanized/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:50:07.000Z</news:publication_date>
      <news:title>Atomic Stealer (AMOS) Returns: ClickFix, Trojanized Crypto Apps, and a New macOS Persistence Mechanism</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/apt28-deploys-prismex-malware-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:50:00.000Z</news:publication_date>
      <news:title>APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sftdmz/atomic_stealer_amos_macos_malware_decryption/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:48:30.000Z</news:publication_date>
      <news:title>Atomic Stealer (AMOS) macOS Malware Decryption, Anti-VM, Hardware Wallet Trojanization &amp; Persistent Backdoor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/ics-ot-security/iranian-threat-actors-us-critical-infrastructure-exposed-plcs</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:46:29.000Z</news:publication_date>
      <news:title>Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sft49c/russian_state_hackers_are_hijacking_tplink_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:38:19.000Z</news:publication_date>
      <news:title>Russian state hackers are hijacking TP-Link and MicroTik routers to steal Outlook credentials, cybersecurity center warns — APT28 group targets DNS and redirects traffic to attacker-controlled servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fbi-cybercrime-losses-neared-21-billion-in-2025/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:32:53.000Z</news:publication_date>
      <news:title>FBI: Cybercrime Losses Neared $21 Billion in 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/russian-state-sponsored-hackers-hijack-home-and-small-office-routers-for-espionage</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:31:25.000Z</news:publication_date>
      <news:title>Russian hacking group targets home and small office routers to spy on users</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfsv1q/what_does_the_job_entail/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:28:22.000Z</news:publication_date>
      <news:title>What does the job entail?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfstn6/broken_by_default_i_formally_proved_that/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:26:43.000Z</news:publication_date>
      <news:title>Broken by Default: I formally proved that LLM-generated C/C++ code is broken by default — 55.8% vulnerable, 97.8% invisible to existing tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfsf08/why_i_think_mythos_is_gonna_be_game_changing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T13:10:23.000Z</news:publication_date>
      <news:title>Why i think Mythos is gonna be game changing after using Opus for a CTF</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfs0sm/i_built_a_free_tool_that_creates_a_realtime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:54:36.000Z</news:publication_date>
      <news:title>I built a free tool that creates a realtime deepfake of you in the browser</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfruzd/thousands_of_consumer_routers_hacked_by_russias/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:47:46.000Z</news:publication_date>
      <news:title>Thousands of consumer routers hacked by Russia's military</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfrpb2/solving_the_shadow_ai_problem_in_the_codebases/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:40:58.000Z</news:publication_date>
      <news:title>Solving the shadow AI problem in the codebases</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/massachusetts-hospital-diverts-ambulances-as-cyberattack-causes-disruption/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:31:39.000Z</news:publication_date>
      <news:title>Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/social-engineering-open-source-developers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:26:27.000Z</news:publication_date>
      <news:title>Social engineering attacks on open source developers are escalating</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfr871/fbi_americans_lost_a_record_21_billion_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:20:17.000Z</news:publication_date>
      <news:title>FBI: Americans lost a record 21 billion to cybercrime last year</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/08/cisa-adds-one-known-exploited-vulnerability-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds One Known Exploited Vulnerability to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/evasive-masjesu-ddos-botnet-targets-iot-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:49:44.000Z</news:publication_date>
      <news:title>Evasive Masjesu DDoS Botnet Targets IoT Devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfqbyt/contagious_interview_now_ships_malicious_packages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:39:13.000Z</news:publication_date>
      <news:title>Contagious Interview now ships malicious packages to npm, PyPI, Go, Rust, and PHP</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:30:00.000Z</news:publication_date>
      <news:title>Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/shrinking-iam-attack-surface-through.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:30:00.000Z</news:publication_date>
      <news:title>Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/hackers-targeting-critical-ninja-forms-bug-that-exposes-wordpress-sites-to-takeover/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:20:23.000Z</news:publication_date>
      <news:title>Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfpmg9/reading_etcpasswd_via_translation_file_upload_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:03:55.000Z</news:publication_date>
      <news:title>Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/us-disrupts-russian-espionage-operation-involving-hacked-routers-and-dns-hijacking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:54:14.000Z</news:publication_date>
      <news:title>US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/cisa/ongoing-cyberattacks-targeting-internet-connected-plcs-disrupt-us-critical-infrastructure-agencies-warn/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:38:03.000Z</news:publication_date>
      <news:title>Ongoing cyberattacks targeting internet-connected PLCs disrupt US critical infrastructure, agencies warn</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfp46v/brandefense_q4_2025_ransomware_trends_report_2373/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:36:41.000Z</news:publication_date>
      <news:title>Brandefense Q4 2025 Ransomware Trends Report — 2,373 incidents, 125 groups, CVE exploitation breakdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/fbi-reports-cyber-threats-to-critical-infrastructure-intensify-as-us-cybercrime-losses-hit-21-billion-exposes-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:33:59.000Z</news:publication_date>
      <news:title>FBI reports cyber threats to critical infrastructure intensify as US cybercrime losses hit $21 billion, exposes risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/scams/2026/04/timeshare-owners-warned-to-watch-out-for-cartel-linked-scams</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:25:08.000Z</news:publication_date>
      <news:title>Timeshare owners warned to watch out for cartel-linked scams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfovzn/training_for_device_code_phishing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:24:01.000Z</news:publication_date>
      <news:title>Training for Device Code Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/tosi-reports-us-enterprises-improve-ot-security-maturity-but-vendor-access-emerges-as-critical-weakness/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:17:09.000Z</news:publication_date>
      <news:title>Tosi reports US enterprises improve OT security maturity, but vendor access emerges as critical weakness</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/iran-targets-us-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:14:04.000Z</news:publication_date>
      <news:title>Iranian cyber activity hits US energy, water, and government networks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfomic/axios_npm_attack_technical_breakdown/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:08:54.000Z</news:publication_date>
      <news:title>Axios npm attack: technical breakdown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/bitsight-names-john-clancy-as-ceo-to-steer-growth-in-ai-driven-cybersecurity-era/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:06:25.000Z</news:publication_date>
      <news:title>Bitsight names John Clancy as CEO to steer growth in AI-driven cybersecurity era</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/us-thwarts-dns-hijacking-network/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:03:00.000Z</news:publication_date>
      <news:title>US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/chaos-malware-cloud-misconfigured-servers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T09:34:07.000Z</news:publication_date>
      <news:title>Chaos malware expands from routers to Linux cloud servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfnquv/bug_bounty_programs_about_to_get_expensiv/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T09:16:37.000Z</news:publication_date>
      <news:title>Bug Bounty Programs About to Get Expensiv</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/anthropics-claude-mythos-finds.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T09:16:00.000Z</news:publication_date>
      <news:title>Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/claude-apache-activemq-bug-hidden/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T09:15:00.000Z</news:publication_date>
      <news:title>Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfnltx/authorities_disrupt_router_dns_hijacks_used_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T09:08:09.000Z</news:publication_date>
      <news:title>Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/flatpak-1-16-4-released-fixes-sandbox-escape/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:32:30.000Z</news:publication_date>
      <news:title>Flatpak 1.16.4 fixes sandbox escape and three other security flaws</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/secureframe-user-access-reviews/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:24:57.000Z</news:publication_date>
      <news:title>Secureframe expands Comply with User Access Reviews for automated governance</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/iranbacked-hackers-cni-ot-assets/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:15:00.000Z</news:publication_date>
      <news:title>Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/n-korean-hackers-spread-1700-malicious.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:47:00.000Z</news:publication_date>
      <news:title>N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sflk3t/spooler_alert_remote_unauthd_rcetoroot_chain_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:01:17.000Z</news:publication_date>
      <news:title>Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-fix-for-broken-windows-start-menu-search/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:00:55.000Z</news:publication_date>
      <news:title>Microsoft rolls out fix for broken Windows Start Menu search</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:00:00.000Z</news:publication_date>
      <news:title>Men Are Buying Hacking Tools to Use Against Their Wives and Friends</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/kumar-ravi-tmf-group-professional-services-cybersecurity-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:30:45.000Z</news:publication_date>
      <news:title>What managing partners should ask AI vendors before signing any contract</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfjl30/how_to_stay_ai_relevant_in_cyber_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:07:32.000Z</news:publication_date>
      <news:title>How to stay AI relevant in cyber security?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/ai-6g-networks-design/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:00:50.000Z</news:publication_date>
      <news:title>6G network design puts AI at the center of spectrum, routing, and fault management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sfjg9f/fairwords_npm_packages_compromised_by_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:00:27.000Z</news:publication_date>
      <news:title>@fairwords npm packages compromised by a self-propagating credential worm - steals tokens, infects other packages you own, then crosses to PyPI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/openssl-3-6-2-security-patch/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:43:43.000Z</news:publication_date>
      <news:title>OpenSSL 3.6.2 lands with eight CVE fixes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfj1u9/cloudflare_targets_2029_for_full_postquantum/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:38:24.000Z</news:publication_date>
      <news:title>Cloudflare targets 2029 for full post-quantum security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/large-botnets-campaigns-attack-activity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:30:01.000Z</news:publication_date>
      <news:title>Cybercriminals move deeper into networks, hiding in edge infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfitgn/40_companies_were_given_access_to_claude_mythos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:26:03.000Z</news:publication_date>
      <news:title>40 companies were given access to Claude Mythos to "secure both first-party and open-source systems" at a time when hackers/APTs have practically infiltrated most organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/anthropic-claude-mythos-preview-identify-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:23:35.000Z</news:publication_date>
      <news:title>Anthropic’s new AI model finds and exploits zero-days across every major OS and browser</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfirnm/ai_is_writing_40plus_of_code_now_sounds/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:23:26.000Z</news:publication_date>
      <news:title>“AI is writing 40%plus of code now” sounds impressive… until you look at the security side of it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:23:00.000Z</news:publication_date>
      <news:title>Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfii4a/best_free_password_manager_right_now/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:09:55.000Z</news:publication_date>
      <news:title>Best free password manager right now?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/08/cybersecurity-jobs-available-right-now-april-8-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:00:40.000Z</news:publication_date>
      <news:title>Cybersecurity jobs available right now: April 8, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfhmaa/we_found_a_path_traversal_in_an_mcp_server_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T03:26:11.000Z</news:publication_date>
      <news:title>We found a path traversal in an MCP server with 7,700 stars that lets AI agents read your SSH keys. Fix merged.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/iran-linked-hackers-disrupt-us-critical-infrastructure-via-plc-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T02:57:56.000Z</news:publication_date>
      <news:title>Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfgiq6/how_often_do_you_use_bash_or_python/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T02:34:02.000Z</news:publication_date>
      <news:title>How often do you use bash? Or python</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfg427/ai_agents_can_trigger_realworld_actions_why_dont/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T02:15:23.000Z</news:publication_date>
      <news:title>AI agents can trigger real-world actions. Why don’t we have cryptographic proof of delegation yet?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32876</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sff2un/not_sure_where_to_go_from_here/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T01:29:14.000Z</news:publication_date>
      <news:title>Not sure where to go from here</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfeemo/strengthen_linux_security_cis_hardening_guide_2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:59:44.000Z</news:publication_date>
      <news:title>Strengthen Linux Security: CIS Hardening Guide (2026)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sfe68f/from_uart_to_root_vendor_shell_escape_on_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:49:31.000Z</news:publication_date>
      <news:title>From UART to Root: Vendor Shell Escape on a Uniview IP Camera</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52500</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] xibocms 3.3.4 - RCE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52501</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:00:00.000Z</news:publication_date>
      <news:title>[local] 7-Zip 24.00 - Directory Traversal</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52502</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] FortiWeb  8.0.2 - Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/research/understanding-and-anticipating-venezuelan-government-actions</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:00:00.000Z</news:publication_date>
      <news:title>Understanding and Anticipating Venezuelan Government Actions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52497</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Horilla v1.3 - RCE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52498</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:00:00.000Z</news:publication_date>
      <news:title>[local] Microsoft MMC MSC EvilTwin - Local Admin Creation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52499</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:00:00.000Z</news:publication_date>
      <news:title>[local] SQLite 3.50.1 - Heap Overflow</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/forest-blizzard-apt28-routers-espionage-campaign-operation-masquerade/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T23:46:53.000Z</news:publication_date>
      <news:title>Feds quash widespread Russia-backed espionage network spanning 18,000 devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sfacj9/ec_breach_via_trivy_supply_chain_attack_the_irony/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T22:08:21.000Z</news:publication_date>
      <news:title>EC Breach via Trivy Supply Chain Attack: The irony</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T22:03:01.000Z</news:publication_date>
      <news:title>Hackers exploit critical flaw in Ninja Forms WordPress plugin</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/bypass-of-aws-sandbox-network-isolation-mode/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T22:00:11.000Z</news:publication_date>
      <news:title>Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf85uo/how_to_exploit_ai_agents_using_prompt_injection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:45:16.000Z</news:publication_date>
      <news:title>How to exploit AI agents using prompt injection, tool hijacking, and memory poisoning based on the OWASP Agentic Top 10.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:41:52.000Z</news:publication_date>
      <news:title>FBI: Americans lost a record $21 billion to cybercrime last year</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf7sno/cve202634197_activemq_rce_via_jolokia_api/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:31:22.000Z</news:publication_date>
      <news:title>CVE-2026-34197: ActiveMQ RCE via Jolokia API</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf7q11/assessing_claude_mythos_previews_capabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:28:44.000Z</news:publication_date>
      <news:title>Assessing Claude Mythos Preview’s capabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fbi-pentagon-warn-iran-hacking-groups-target-ot</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:26:00.000Z</news:publication_date>
      <news:title>FBI, Pentagon warn of Iran hacking groups targeting operational technology</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/storm-1175-medusa-ransomware-high-velocity</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:15:07.000Z</news:publication_date>
      <news:title>Storm-1175 Deploys Medusa Ransomware at 'High Velocity'</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:13:51.000Z</news:publication_date>
      <news:title>Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/grafana-patches-ai-bug-leaked-user-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:52:26.000Z</news:publication_date>
      <news:title>Grafana Patches AI Bug That Could Have Leaked User Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf6qtt/where_ai_meets_server_assault/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:52:12.000Z</news:publication_date>
      <news:title>Where AI meets server assault</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf6iup/beyond_burnt_out_unsure_where_to_turn/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:44:03.000Z</news:publication_date>
      <news:title>Beyond burnt out, unsure where to turn.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:39:18.000Z</news:publication_date>
      <news:title>Snowflake customers hit in data theft attacks after SaaS integrator breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf66av/cyber_security_and_electrical_engineering/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:31:39.000Z</news:publication_date>
      <news:title>Cyber security and electrical engineering?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf5tvm/free_cti_fusion_playbook/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:18:55.000Z</news:publication_date>
      <news:title>Free CTI Fusion Playbook</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf5fbb/mythos_has_been_launched/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:04:26.000Z</news:publication_date>
      <news:title>Mythos has been launched!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf5968/want_to_be_a_pentester_let_me_tell_you_how_actual/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:58:34.000Z</news:publication_date>
      <news:title>Want to be a pentester? Let me tell you how! (Actual pentester)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf550g/the_race_to_ship_ai_tools_left_security_behind/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:54:28.000Z</news:publication_date>
      <news:title>The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/online-crime-financial-losses-fbi-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:53:17.000Z</news:publication_date>
      <news:title>Cybercrime losses break the $20 billion mark</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/anthropic-mythos-preview-project-glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:49:50.000Z</news:publication_date>
      <news:title>Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4w9j/anthropic_announces_new_initiative_project/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:45:38.000Z</news:publication_date>
      <news:title>Anthropic announces new initiative, Project Glasswing, with tech + security partners and Claude Mythos Preview model to secure critical software</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:39:56.000Z</news:publication_date>
      <news:title>Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4p1c/german_authorities_identify_revil_and_gandcrab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:38:22.000Z</news:publication_date>
      <news:title>German authorities identify REvil and GandCrab ransomware bosses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4mzs/iranianaffiliated_cyber_actors_exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:36:16.000Z</news:publication_date>
      <news:title>Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4m5v/what_information_about_a_cve_do_you_pay_attention/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:35:28.000Z</news:publication_date>
      <news:title>What information about a CVE do you pay attention to and why?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32874</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:28:16.000Z</news:publication_date>
      <news:title>A Little Bit Pivoting: What Web Shells are Attackers Looking for&amp;#x3f;, (Tue, Apr 7th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf3qun/tech_giants_launch_aipowered_project_glasswing_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:05:06.000Z</news:publication_date>
      <news:title>Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:02:26.000Z</news:publication_date>
      <news:title>US warns of Iranian hackers targeting critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/project-glasswing-anthropic-ai-open-source-software-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:00:00.000Z</news:publication_date>
      <news:title>Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/iranian-hackers-cyberattacks-us-energy-water-infrastructure-plc-scada-warning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:58:47.000Z</news:publication_date>
      <news:title>Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf39zm/anthropic_opus_46_is_less_good_at_finding_vulns/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:48:55.000Z</news:publication_date>
      <news:title>Anthropic Opus 4.6 is less good at finding vulns than you might think</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:02:44.000Z</news:publication_date>
      <news:title>Russia Hacked Routers to Steal Microsoft Office Tokens</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:02:05.000Z</news:publication_date>
      <news:title>Max severity Flowise RCE vulnerability now exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/russian-state-linked-apt28-exploits.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:48:00.000Z</news:publication_date>
      <news:title>Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fbi-internet-crime-complaint-center-annual-cybercrime-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:47:46.000Z</news:publication_date>
      <news:title>Cybercrime losses jumped 26% to $20.9 billion in 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/the-new-rules-of-engagement-matching-agentic-attack-speed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:40:52.000Z</news:publication_date>
      <news:title>The New Rules of Engagement: Matching Agentic Attack Speed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf16o3/sandbox_app_like_anyrun_but_not_anyrun/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:36:59.000Z</news:publication_date>
      <news:title>sandbox app like "any.run" but not any.run?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:34:26.000Z</news:publication_date>
      <news:title>Trent AI Emerges From Stealth With $13 Million in Funding</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/national-security-vets-warn-section-702-authorization-delay</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:29:00.000Z</news:publication_date>
      <news:title>National security veterans warn against delays in FISA 702 reauthorization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/russian-hackers-router-hijacking-dns-credential-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:18:00.000Z</news:publication_date>
      <news:title>Russian hackers hijack internet traffic using vulnerable routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf0mci/aspiring_grc_analyst/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:17:05.000Z</news:publication_date>
      <news:title>Aspiring GRC analyst</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf04s0/i_built_a_recon_tool_that_turns_exposed_secrets/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:00:15.000Z</news:publication_date>
      <news:title>I built a recon tool that turns exposed secrets into real attack paths</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:52:00.000Z</news:publication_date>
      <news:title>Massachusetts hospital turning ambulances away after cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:51:22.000Z</news:publication_date>
      <news:title>Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sezrmc/javascript_runtime_instrumentation_via_chrome/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:47:25.000Z</news:publication_date>
      <news:title>JavaScript runtime instrumentation via Chrome DevTools Protocol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezqge/soc_practice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:46:13.000Z</news:publication_date>
      <news:title>Soc practice</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezhpr/your_agent_remembers_your_secrets_and_keys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:37:25.000Z</news:publication_date>
      <news:title>Your agent remembers your secrets and keys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/critical-flowise-vulnerability-in-attacker-crosshairs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:34:51.000Z</news:publication_date>
      <news:title>Critical Flowise Vulnerability in Attacker Crosshairs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/storm-1175-exploits-web-facing-systems-to-drive-ransomware-attacks-across-healthcare-and-services-in-us-uk-australia/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:33:01.000Z</news:publication_date>
      <news:title>Storm-1175 exploits web-facing systems to drive ransomware attacks across healthcare and services in US, UK, Australia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/malaysias-digital-growth-and-geopolitics-widen-cyber-attack-surface-raising-critical-infrastructure-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:22.000Z</news:publication_date>
      <news:title>Malaysia’s digital growth and geopolitics widen cyber attack surface, raising critical infrastructure risks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezakj/soc_hand_on_project/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:18.000Z</news:publication_date>
      <news:title>Soc hand on project</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:00.000Z</news:publication_date>
      <news:title>Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/finite-state-appoints-ann-miller-to-scale-product-security-and-software-supply-chain-strategy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:28:26.000Z</news:publication_date>
      <news:title>Finite State appoints Ann Miller to scale product security and software supply chain strategy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:15:00.000Z</news:publication_date>
      <news:title>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/gpu-based-rowhammer-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:05:00.000Z</news:publication_date>
      <news:title>GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/07/qualys-cloud-security-forecast-2026-risk-trends-insights</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:00:00.000Z</news:publication_date>
      <news:title>Signals from the Cloud Security Forecast 2026: Cloud Risk Is Scaling through Design, Not Disruption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:57:16.000Z</news:publication_date>
      <news:title>RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexzs6/we_finally_built_a_vulnerability_prioritization/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:43:19.000Z</news:publication_date>
      <news:title>We finally built a vulnerability prioritization system and now the real problems are showing up!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:36:44.000Z</news:publication_date>
      <news:title>Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/lies-damned-lies-cybersecurity-metrics</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:26:02.000Z</news:publication_date>
      <news:title>Lies, Damned Lies, and Cybersecurity Metrics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/severe-strongbox-vulnerability-patched-in-android/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:23:51.000Z</news:publication_date>
      <news:title>Severe StrongBox Vulnerability Patched in Android</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexcn2/how_do_you_work_with_downloads_from_untrusted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:19:43.000Z</news:publication_date>
      <news:title>How do you work with downloads from untrusted sources ? What are the safest practices to avoid malware and attacks?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexaln/feature_updatespatch_mgmt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:17:36.000Z</news:publication_date>
      <news:title>Feature updates/patch mgmt</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sewxk6/grafanaghost_bypasses_grafanas_ai_defenses/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:04:10.000Z</news:publication_date>
      <news:title>‘GrafanaGhost’ bypasses Grafana's AI defenses without leaving a trace</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/why-your-automated-pentesting-tool-just-hit-a-wall/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:01:11.000Z</news:publication_date>
      <news:title>Why Your Automated Pentesting Tool Just Hit a Wall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/uk-exposes-russian-cyber-unit-hacking-home-routers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>UK exposes Russian cyber unit hacking home routers to hijack internet traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:58:45.000Z</news:publication_date>
      <news:title>GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/grafanaghost-grafana-prompt-injection-vulnerability-data-exfiltration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:44:35.000Z</news:publication_date>
      <news:title>‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sewcwa/run_the_funnyappexe_and_youre_a_windows_admin_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:42:10.000Z</news:publication_date>
      <news:title>Run the FunnyApp.exe, and you’re a Windows admin. An unknown individual just dropped a zero-day exploit for elevating privileges on Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/acronis-mdr-by-acronis-tru/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:37:53.000Z</news:publication_date>
      <news:title>Acronis MDR by TRU brings 24/7 managed detection and response to MSPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/webinar-today-why-automated-pentesting-alone-is-not-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:19:29.000Z</news:publication_date>
      <news:title>Webinar Today: Why Automated Pentesting Alone Is Not Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/cloudflare-post-quantum-authentication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:35.000Z</news:publication_date>
      <news:title>Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/focusing-people-cybersecurity-rsac2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:00.000Z</news:publication_date>
      <news:title>Focusing on the People in Cybersecurity at RSAC 2026 Conference</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sev5qf/are_group_interviews_a_scam/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:54:35.000Z</news:publication_date>
      <news:title>Are group interviews a scam?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:46:00.000Z</news:publication_date>
      <news:title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seumfv/your_ai_agent_has_more_access_than_your_employees/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:41.000Z</news:publication_date>
      <news:title>Your AI Agent Has More Access Than Your Employees</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/webinar-how-to-close-identity-gaps-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:17:00.000Z</news:publication_date>
      <news:title>[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cyberattack-hits-northern-ireland-schools</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:04:00.000Z</news:publication_date>
      <news:title>Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/17bn-lost-to-cyber-fraud-warns-fbi/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:00:00.000Z</news:publication_date>
      <news:title>Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/microsoft-device-code-phishing-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:57:49.000Z</news:publication_date>
      <news:title>AI-enabled device code phishing campaign exploits OAuth flow for account takeover</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/traffic-violation-scams-swap-links-for-qr-codes-to-steal-your-card-details</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:57:37.000Z</news:publication_date>
      <news:title>Traffic violation scams swap links for QR codes to steal your card details</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sett79/microsoft_speech_lateral_movement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:55:29.000Z</news:publication_date>
      <news:title>Microsoft Speech - Lateral Movement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1setrdw/microsoft_speech_lateral_movement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:53:04.000Z</news:publication_date>
      <news:title>Microsoft Speech - Lateral Movement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/gpubreach-root-shell-access-achieved-via-gpu-rowhammer-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:31:38.000Z</news:publication_date>
      <news:title>GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/the-hidden-cost-of-recurring-credential.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:30:00.000Z</news:publication_date>
      <news:title>The Hidden Cost of Recurring Credential Incidents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sesllm/flowise_ai_agent_builder_under_active_cvss_100/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:55:02.000Z</news:publication_date>
      <news:title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:52:33.000Z</news:publication_date>
      <news:title>Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/data-breaches/2026/04/support-platform-breach-exposes-hims-hers-customer-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:45:50.000Z</news:publication_date>
      <news:title>Support platform breach exposes Hims &amp;amp; Hers customer data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ses0p6/need_some_help_to_grow/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:23:00.000Z</news:publication_date>
      <news:title>Need some help to grow</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/csis-flags-irans-shift-from-episodic-cyberattacks-to-sustained-campaign-against-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:18:55.000Z</news:publication_date>
      <news:title>CSIS flags Iran’s shift from episodic cyberattacks to sustained campaign against critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/microchip-secures-iec-62443-4-1-ml2-certification-as-regulatory-pressure-mounts-on-device-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:13:03.000Z</news:publication_date>
      <news:title>Microchip secures IEC 62443-4-1 ML2 certification as regulatory pressure mounts on device security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/storm1175-medusa-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:02:00.000Z</news:publication_date>
      <news:title>Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1serfuv/having_a_siem_does_not_mean_you_have_forensic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:50:16.000Z</news:publication_date>
      <news:title>Having a SIEM Does Not Mean You Have Forensic Readiness</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1serejf/pqaudit_scan_your_codebase_for_quantumvulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:48:06.000Z</news:publication_date>
      <news:title>pqaudit - scan your codebase for quantum-vulnerable cryptography</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/github-copilot-rubber-duck-cross-model-review/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:27:06.000Z</news:publication_date>
      <news:title>GitHub Copilot CLI gets a second-opinion feature built on cross-model review</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:26:00.000Z</news:publication_date>
      <news:title>Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/german-police-unmask-revil-ransomware-leader/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:24:40.000Z</news:publication_date>
      <news:title>German Police Unmask REvil Ransomware Leader</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seqwbz/i_built_an_autonomous_4agent_cve_redteam_loop/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:17:25.000Z</news:publication_date>
      <news:title>I built an autonomous 4-agent CVE red-team loop that runs overnight on an Android phone — no cloud, no GPU, BLAKE3-verified logs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.welivesecurity.com/en/business-security/breakout-time-accelerates-prevention-first-cybersecurity-center-stage/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:00:00.000Z</news:publication_date>
      <news:title>As breakout time accelerates, prevention-first cybersecurity takes center stage</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/comp-ai-open-source-compliance-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:45:44.000Z</news:publication_date>
      <news:title>Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/openai-safety-fellowship-applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:39:52.000Z</news:publication_date>
      <news:title>OpenAI opens applications for an external AI safety research fellowship</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/new-gpubreach-attack-enables-full-cpu.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:38:00.000Z</news:publication_date>
      <news:title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seq5mg/chipsoft_website_is_offline/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:31:29.000Z</news:publication_date>
      <news:title>Chipsoft website is offline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/white-house-seeks-to-slash-cisa-funding-by-707-million/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:29:41.000Z</news:publication_date>
      <news:title>White House Seeks to Slash CISA Funding by $707 Million</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sep4hy/detecting_cicd_supply_chain_attacks_with_canary/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:27:50.000Z</news:publication_date>
      <news:title>Detecting CI/CD Supply Chain Attacks with Canary Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:35:00.000Z</news:publication_date>
      <news:title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:05:54.000Z</news:publication_date>
      <news:title>Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:56:00.000Z</news:publication_date>
      <news:title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1senj1s/결제_도용fraud_시도로_인한_트래픽_폭주_및_인프라_가용성_보호_전략/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:54:45.000Z</news:publication_date>
      <news:title>결제 도용(Fraud) 시도로 인한 트래픽 폭주 및 인프라 가용성 보호 전략</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1semz63/another_cryptominer_undected_by_windows_defender/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:23:57.000Z</news:publication_date>
      <news:title>Another cryptominer - undected by Windows Defender / ESET NOD32 and Malwarebytes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1semk5r/prompt_injection_detection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:01:36.000Z</news:publication_date>
      <news:title>Prompt Injection Detection?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/alec-summers-mitre-cwe-vulnerability-mapping/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:00:51.000Z</news:publication_date>
      <news:title>The case for fixing CWE weakness patterns instead of patching one bug at a time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/crowdstrike-founding-member-anthropic-mythos-frontier-model-to-secure-ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:00:00.000Z</news:publication_date>
      <news:title>Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/mimecast-api-email-security-protection-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:30:18.000Z</news:publication_date>
      <news:title>How Mimecast brings enterprise-grade email protection to API deployment</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1selt3a/metatron_ai_penetration_testing_assistant_open/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:22:28.000Z</news:publication_date>
      <news:title>Metatron -AI PENETRATION TESTING ASSISTANT (open source)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sellln/i_was_targeted_by_a_fake_job_interview_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:12:05.000Z</news:publication_date>
      <news:title>I was targeted by a fake job interview on Wellfound. Instead of becoming a victim I reverse-engineered the malware. Here's the full analysis: 571 encrypted config values decrypted, C2 and Sentry DSN exposed, DPRK/Contagious Interview attribution.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/google-llm-content-moderation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:00:57.000Z</news:publication_date>
      <news:title>Google study finds LLMs are embedded at every stage of abuse detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sejkxy/orewatch_opensource_malicious_package_scanner/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:37:34.000Z</news:publication_date>
      <news:title>OreWatch – open-source malicious package scanner across 6 ecosystems, now with an MCP server so your AI coding agent stops installing malware.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sej7hc/deepzero_an_automated_agentic_vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:20:41.000Z</news:publication_date>
      <news:title>DeepZero: An automated, agentic vulnerability research pipeline for finding kernel zero-days</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sej48f/deepzero_an_automated_llmghidra_pipeline_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:16:40.000Z</news:publication_date>
      <news:title>DeepZero: An automated LLM/Ghidra pipeline for finding BYOVD zero-days in Windows drivers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32872</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seimh0/schedule_reporting_use_cases_in_opencti/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T01:54:41.000Z</news:publication_date>
      <news:title>Schedule reporting use cases in OpenCTI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seifit/recurring_failure_patterns_when_testing_llmbacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T01:46:08.000Z</news:publication_date>
      <news:title>Recurring failure patterns when testing LLM-backed APIs from a security perspective</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1segtd7/discover_the_top_25_cybersecurity_companies_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T00:35:59.000Z</news:publication_date>
      <news:title>Discover the top 25 cybersecurity companies in the U.S. that are leading the fight against cyber threats.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:54:04.000Z</news:publication_date>
      <news:title>German authorities identify REvil and GangCrab ransomware bosses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sefbus/this_video_demonstrates_a_reproducible_googleside/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:32:50.000Z</news:publication_date>
      <news:title>This video demonstrates a reproducible Google‑side issue where the system restores data that the user has deleted. The behavior happens in real time. It is not a cache problem, not a UI refresh glitch, and not user error</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seenqt/fbi_ic3_report_finding_sim_swap_attacks_surging/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:05:14.000Z</news:publication_date>
      <news:title>FBI IC3 report- Finding: Sim swap attacks surging</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/rostelecom-cyberattack-disrupts-russian-internet-access</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:00:00.000Z</news:publication_date>
      <news:title>Cyberattack on telecom giant Rostelecom disrupts internet services across Russia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1see9fk/hackathon/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:49:15.000Z</news:publication_date>
      <news:title>Hack-a-Thon</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sede4m/disgruntled_researcher_leaks_bluehammer_windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:14:42.000Z</news:publication_date>
      <news:title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/modern-kubernetes-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:00:08.000Z</news:publication_date>
      <news:title>Understanding Current Threats to Kubernetes Environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:44:15.000Z</news:publication_date>
      <news:title>New GPUBreach attack enables system takeover via GPU rowhammer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/ai-assisted-supply-chain-attack-targets-github</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:38:53.000Z</news:publication_date>
      <news:title>AI-Assisted Supply Chain Attack Targets GitHub</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:12:01.000Z</news:publication_date>
      <news:title>Fortinet customers confront actively exploited zero-day, with a full patch still pending</news:title>
    </news:news>
  </url>
</urlset>