<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1cgd/can_you_guys_me_suggestions_should_i_do_bca_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:34:43.000Z</news:publication_date>
      <news:title>Can you guys me suggestions, should i do BCA in Cyber Security or something else to get into CS field ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0tzy/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:05:25.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0qbj/deployed_goadlight_on_virtualbox_ubuntu_2404/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:57.000Z</news:publication_date>
      <news:title>Deployed GOAD-Light on VirtualBox (Ubuntu 24.04) - sharing my guide with the real errors I hit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd0q71/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:45.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0nzk/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:56:03.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0667/soc_analyst_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:25:46.000Z</news:publication_date>
      <news:title>SOC Analyst 1</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:00:00.000Z</news:publication_date>
      <news:title>The Hack That Exposed Syria’s Sweeping Security Failures</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scyj3y/feeling_stuck_and_looking_for_honest_advice_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:41:38.000Z</news:publication_date>
      <news:title>feeling stuck and looking for honest advice on whats next</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scy246/about_to_take_ejpt_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:11:26.000Z</news:publication_date>
      <news:title>About to take eJPT. help..</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scxx6w/cyber_crimes_attempt_preperation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:02:50.000Z</news:publication_date>
      <news:title>Cyber crimes &amp; attempt - preperation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:00:49.000Z</news:publication_date>
      <news:title>Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1scx6s9/database_of_malicious_chromeedge_extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:17:46.000Z</news:publication_date>
      <news:title>Database of malicious Chrome/Edge extensions - auto-updated daily</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/rising-breach-costs-and-operational-downtime-redefine-economics-of-ot-cybersecurity-making-it-boardroom-priority/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:55:32.000Z</news:publication_date>
      <news:title>Rising breach costs and operational downtime redefine economics of OT cybersecurity making it boardroom priority</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwnd9/the_visible_key_a_new_way_to_verify_source/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:45:42.000Z</news:publication_date>
      <news:title>The Visible Key — A New Way to Verify Source</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwfwe/are_companies_pushing_the_good_guys_to_go_rogue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:33:08.000Z</news:publication_date>
      <news:title>Are companies pushing the good guys to go rogue?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T05:07:00.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T04:32:00.000Z</news:publication_date>
      <news:title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct8hp/do_you_guys_think_risk_based_alerting_is_dead_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:38:21.000Z</news:publication_date>
      <news:title>Do you guys think Risk Based Alerting is dead in water with the AI landscape.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct022/i_created_a_small_lab_demo_showing_how_responder/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:26:18.000Z</news:publication_date>
      <news:title>I created a small lab demo showing how #Responder can capture NTLM hashes over a local network.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsq79/which_cyber_roles_are_truly_aiproof/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:12:41.000Z</news:publication_date>
      <news:title>Which cyber roles are truly "AI-proof"?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsguv/linkedin_is_spying_on_you_according_to_a_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:00:11.000Z</news:publication_date>
      <news:title>LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scpul1/offering_free_help_with_penetration_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:51:52.000Z</news:publication_date>
      <news:title>Offering Free Help with Penetration Testing Projects (Looking to Build Experience)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scphzz/after_the_mercor_breach_i_built_a_local_secret/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:35:24.000Z</news:publication_date>
      <news:title>After the Mercor breach, I built a local secret scanner for AI-generated code</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scojim/uk_about_to_be_over_employed_have_i_ruined_future/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T23:50:23.000Z</news:publication_date>
      <news:title>UK -About to be over employed - have I ruined future chances at obtaining SC?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scmq9l/website_provider_gave_client_an_spf_include_to_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:29:52.000Z</news:publication_date>
      <news:title>Website provider gave client an SPF include to a domain they did not control, and it was set to +all</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scm5bc/fortinet_cve202635616_actively_exploited_as_zero/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:04:19.000Z</news:publication_date>
      <news:title>Fortinet CVE-2026-35616 Actively Exploited as Zero Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sclo8j/how_i_stole_aes_keys_from_a_microcontroller_using/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:44:25.000Z</news:publication_date>
      <news:title>How I stole AES keys from a microcontroller using power analysis (ChipWhisperer walkthrough)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sckmlw/i_have_refactored_slurp_s3_bucket_enumerator_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:01:45.000Z</news:publication_date>
      <news:title>I have refactored slurp s3 bucket enumerator to work with any s3 compatible cloud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck5t9/5_yoe_appsec_at_faang_microsoft_what_is_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:43:02.000Z</news:publication_date>
      <news:title>5 YOE AppSec at FAANG (Microsoft). What is the market like for mid career candidates?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck4e3/cisco_patched_a_9810_cve_yesterday_authentication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:41:34.000Z</news:publication_date>
      <news:title>Cisco patched a 9.8/10 CVE yesterday — authentication bypass on IMC that gives full admin access with one HTTP request, no credentials needed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:30:42.000Z</news:publication_date>
      <news:title>Axios npm hack used fake Teams error fix to hijack maintainer account</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scg2ml/open_source_tool_for_supply_chain_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T18:01:15.000Z</news:publication_date>
      <news:title>Open source tool for supply chain malware detection: CTWall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sce4um/how_good_is_recruitment_in_this_space/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:46:46.000Z</news:publication_date>
      <news:title>How good is recruitment in this space</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scczit/where_to_start_in_reverse_engineering_as_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:01:54.000Z</news:publication_date>
      <news:title>Where to start in reverse engineering as an absolutely beginner with no knowledge whatsoever? Ghidra perhaps or something else</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sccnjb/browsergate_linkedinmicrosoft_allegedly_scans/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:48:42.000Z</news:publication_date>
      <news:title>BrowserGate: LinkedIn/Microsoft allegedly scans 6,000+ browser extensions &amp; links them to real identities, all without user consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbniy/burp_suite/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:08:37.000Z</news:publication_date>
      <news:title>Burp Suite</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbc8y/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:56:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb95s/browsergate_report_alleges_linkedin_is_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:52:51.000Z</news:publication_date>
      <news:title>BrowserGate: Report alleges LinkedIn is scanning 6,000+ browser extensions without consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb86j/what_can_be_done_with_an_ip_address/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:51:45.000Z</news:publication_date>
      <news:title>what can be done with an ip address</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1scak6p/apples_spotlight_search_results_come_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:24:13.000Z</news:publication_date>
      <news:title>Apple's Spotlight Search Results Come With Engagement Metrics. No One Knew.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:17:38.000Z</news:publication_date>
      <news:title>Device code phishing attacks surge 37x as new kits spread online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:09:54.000Z</news:publication_date>
      <news:title>FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sc7s4w/pcmag_hackers_are_using_claude_code_leak_as_bait/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T12:18:17.000Z</news:publication_date>
      <news:title>PCMag: Hackers Are Using Claude Code Leak As Bait to Spread Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc5xhj/researchers_uncover_mining_operation_using_iso/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:37:24.000Z</news:publication_date>
      <news:title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:31:00.000Z</news:publication_date>
      <news:title>European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:30:00.000Z</news:publication_date>
      <news:title>Hackers Are Posting the Claude Code Leak With Bonus Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc5et2/more_than_600_cyber_tools_and_resources/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:06:01.000Z</news:publication_date>
      <news:title>More than 600 cyber tools and resources</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4v8z/teampcp_supply_chain_attacks_claim_first_named/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:32:23.000Z</news:publication_date>
      <news:title>TeamPCP supply chain attacks claim first named victims as EC breach traced to Trivy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4h5p/eli5_email_man_in_the_middle/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:08:04.000Z</news:publication_date>
      <news:title>Eli5 email man in the middle</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc46lz/slopsquatscan_cli_tool_that_checks_slopsquatted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:49:53.000Z</news:publication_date>
      <news:title>SlopSquatScan - CLI tool that checks slopsquatted packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc3fju/proofofpersonhood_without_biometrics_the_irlid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:03:07.000Z</news:publication_date>
      <news:title>Proof-of-Personhood Without Biometrics: The IRLid Protocol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc32mz/flood_in_italy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T07:41:38.000Z</news:publication_date>
      <news:title>Flood in Italy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwgy7/how_long_does_it_actually_take_your_team_to_fill/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:51:46.000Z</news:publication_date>
      <news:title>How long does it actually take your team to fill out a vendor security questionnaire?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaru/ciberseguridad_oferta_de_empleo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:44.000Z</news:publication_date>
      <news:title>Ciberseguridad oferta de empleo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaq4/npm_isntall_i_svrnsecshield/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:40.000Z</news:publication_date>
      <news:title>npm isntall -I @Svrnsec/Shield</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/elastic-security-integrations-roundup-q1-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T00:00:00.000Z</news:publication_date>
      <news:title>Elastic Security Integrations Roundup: Q1 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbti2s/shieldnet_trust_posture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:37:12.000Z</news:publication_date>
      <news:title>ShieldNet Trust Posture</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtetw/gslc_value/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:33:16.000Z</news:publication_date>
      <news:title>GSLC value?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtegn/how_to_start_study_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:32:50.000Z</news:publication_date>
      <news:title>How to start study cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbt0xz/hr_reviewing_my_interview_am_i_close_to_an_offer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:16:32.000Z</news:publication_date>
      <news:title>HR reviewing my interview — am I close to an offer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/that-dream-job-offer-from-coca-cola-or-ferrari-its-a-trap-for-your-passwords</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:13:58.000Z</news:publication_date>
      <news:title>That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsoz8/how_to_pivot_into_ot/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:02:27.000Z</news:publication_date>
      <news:title>How to pivot into OT?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsohg/architecture_review_preventing_shadow_ai_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:01:49.000Z</news:publication_date>
      <news:title>Architecture Review: Preventing "Shadow AI" data leaks with a stateless PII firewall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:38.000Z</news:publication_date>
      <news:title>When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbr7kq/openais_gpt54_got_blocked_by_safety_mechanisms_5/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:23.000Z</news:publication_date>
      <news:title>OpenAI's GPT-5.4 got blocked by safety mechanisms 5 times, searched my machine for tools to bypass them, launched Claude Opus with dangerously bypass permissions flags, tried to COVER UP what he had done, then gave me a "perfect" apology when caught</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbqnv6/chinalinked_ta416_targets_european_governments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:38:26.000Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:28:14.000Z</news:publication_date>
      <news:title>Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/data-privacy/inconsistent-privacy-labels-not-enough</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:05:07.000Z</news:publication_date>
      <news:title>Inconsistent Privacy Labels Don't Tell Users What They Are Getting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbpkx6/for_eu_companies_is_zero_data_liability_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:56:33.000Z</news:publication_date>
      <news:title>For EU companies' Is "Zero Data Liability" actually a budget priority?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:40:22.000Z</news:publication_date>
      <news:title>LinkedIn secretly scans for 6,000+ Chrome extensions, collects data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/linkedin-secretely-scans-for-6-000-plus-chrome-extensions-collects-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:40:22.000Z</news:publication_date>
      <news:title>LinkedIn secretely scans for 6,000+ Chrome extensions, collects data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fcc-proposes-5-million-fine-robocall</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:12:00.000Z</news:publication_date>
      <news:title>FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/trueconf-cyberattack-cisa-hackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:45:00.000Z</news:publication_date>
      <news:title>CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbn3w3/what_if_hsms_were_as_easy_to_use_as_they_are/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:22:56.000Z</news:publication_date>
      <news:title>What If HSMs Were as Easy to Use as They Are Powerful? A native macOS app for YubiHSM 2 management</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/the-developer-credential-economy-exposure-data-is-the-new-front-line-in-the-supply-chain-war</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:50:57.000Z</news:publication_date>
      <news:title>The developer credential economy: Why exposure data is the new front line in the supply chain war</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbm7me/the_axios_supply_chain_attack_used_individually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:49:58.000Z</news:publication_date>
      <news:title>The Axios supply chain attack used individually targeted social engineering</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sblspg/i_accidently_let_my_sans_cert_expire_so_i_built_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:34:33.000Z</news:publication_date>
      <news:title>I accidently let my SANS cert expire so I built a tool to track team cert expiry</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sblpgx/hiring_from_a_director_of_cybers_perspective/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:13.000Z</news:publication_date>
      <news:title>Hiring from a director of cyber's perspective.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/european-commission-cyberattack-teampcp</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:15:00.000Z</news:publication_date>
      <news:title>EU cyber agency attributes major data breach to TeamPCP hacking group</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbktww/someone_is_actively_publishing_malicious_packages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:59:26.000Z</news:publication_date>
      <news:title>Someone is actively publishing malicious packages targeting the Strapi plugin ecosystem right now</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbkn6q/is_pki_a_good_longterm_career_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:52:34.000Z</news:publication_date>
      <news:title>Is PKI a good long-term career in cybersecurity? (Scope, salaries, future with AI)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hims-and-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:41:11.000Z</news:publication_date>
      <news:title>Hims &amp; Hers warns of data breach after Zendesk support ticket breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:34:00.000Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbk0ep/seeking_arxiv_endorsement_for_cscr/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:29:24.000Z</news:publication_date>
      <news:title>Seeking Arxiv Endorsement for cs.CR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbjppf/has_anybody_used_zip_security_and_now_what_their/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:18:41.000Z</news:publication_date>
      <news:title>Has anybody used Zip Security and now what their pricing is?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/endpoint-security/apple-patches-darksword-ios-18</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:08:57.000Z</news:publication_date>
      <news:title>Apple Breaks Precedent, Patches DarkSword for iOS 18</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbj51g/relearning_pythonbashpowershell/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:58:07.000Z</news:publication_date>
      <news:title>Relearning Python/Bash/Powershell</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbj2o6/how_false_are_false_positives_moving_from_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:55:47.000Z</news:publication_date>
      <news:title>How "false" are false positives? Moving from a Hunter to an Architect mindset.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbimd3/bots_v2_questions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:39:10.000Z</news:publication_date>
      <news:title>BOTS v2 QUESTIONS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:36:44.000Z</news:publication_date>
      <news:title>Die Linke German political party confirms data stolen by Qilin ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:33:14.000Z</news:publication_date>
      <news:title>Trump budget proposal would cut hundreds of millions more from CISA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/wyden-warns-ssa-chief-trump-voter-database-blatant-voter-suppression/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:30:24.000Z</news:publication_date>
      <news:title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbhdtm/i_just_experienced_my_first_fullblown_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:53:11.000Z</news:publication_date>
      <news:title>I just experienced my first full-blown malware incident as an IT person</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbgxd2/infostealers_ulp_urlloginpassword_data_is_burning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:36:12.000Z</news:publication_date>
      <news:title>Infostealers ULP (url:login:password) Data Is Burning Out SOC Teams and Killing Automation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:32:00.000Z</news:publication_date>
      <news:title>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/teampcp-attacks-hacker-infighting</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:11:16.000Z</news:publication_date>
      <news:title>Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbg683/mssp_recommendations_for_horizon3ai_in_smallscale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:08:09.000Z</news:publication_date>
      <news:title>MSSP recommendations for Horizon3.ai in small-scale, dynamic environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbfq4u/claude_code_found_a_linux_vulnerability_hidden/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:51:20.000Z</news:publication_date>
      <news:title>Claude Code Found a Linux Vulnerability Hidden for 23 Years</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbfil2/npmsentinel_21_malicious_npm_packages_in_24h/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:43:18.000Z</news:publication_date>
      <news:title>npm-sentinel: 21 malicious npm packages in 24h including LLM API MITM, encrypted skill backdoors, and Redis weaponization via postinstall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfg2m/21_malicious_npm_packages_found_in_24_hours_4/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:40:30.000Z</news:publication_date>
      <news:title>21 malicious npm packages found in 24 hours: 4 novel attack vectors targeting AI coding assistants including LLM API MITM and encrypted skill backdoors</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/blocking-children-from-social-media-is-a-badly-executed-good-idea</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:37:52.000Z</news:publication_date>
      <news:title>Blocking children from social media is a badly executed good idea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfcxj/new_rowhammer_attacks_give_complete_control_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:37:05.000Z</news:publication_date>
      <news:title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbfcrd/i_feel_behind/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:36:53.000Z</news:publication_date>
      <news:title>I feel behind</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:05:15.000Z</news:publication_date>
      <news:title>Evolution of Ransomware: Multi-Extortion Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbehds/is_this_a_good_roadmap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:02:55.000Z</news:publication_date>
      <news:title>Is this a good roadmap?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/massachusetts-emergency-alert-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:00:00.000Z</news:publication_date>
      <news:title>Massachusetts emergency communications system impacted by cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbe9tn/using_undocumented_aws_codebuild_endpoints_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:54:42.000Z</news:publication_date>
      <news:title>Using undocumented AWS CodeBuild endpoints to extract privileged tokens from AWS CodeConnections allowing lateral movement and privilege escalation through an organisation's codebase</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbdtyi/if_youre_running_openclaw_you_probably_got_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:36:49.000Z</news:publication_date>
      <news:title>If you're running OpenClaw, you probably got hacked in the last week</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbds9i/if_youre_running_openclaw_you_probably_got_hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:34:55.000Z</news:publication_date>
      <news:title>If you're running OpenClaw, you probably got hacked in the last week</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/remote-workforce/skull-vibrations-could-be-xr-headset-authentication</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:30:00.000Z</news:publication_date>
      <news:title>Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ukraine-warns-russian-hackers-revisiting-old-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:20:00.000Z</news:publication_date>
      <news:title>Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32864</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:18:01.000Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000&amp;#x2b; SaaS Environments, (Fri, Apr 3rd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:00:00.000Z</news:publication_date>
      <news:title>Source Code Leaks Highlight Lack of Supply Chain Oversight</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-14-6/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:00:00.000Z</news:publication_date>
      <news:title>The Good, the Bad and the Ugly in Cybersecurity – Week 14</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:59:22.000Z</news:publication_date>
      <news:title>Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:57:28.000Z</news:publication_date>
      <news:title>Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbcny3/man_admits_to_locking_thousands_of_windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:48:03.000Z</news:publication_date>
      <news:title>Man admits to locking thousands of Windows devices in extortion plot</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trueconf-zero-day-exploited-in-asian-government-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:47:16.000Z</news:publication_date>
      <news:title>TrueConf Zero-Day Exploited in Asian Government Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbclqe/characterizing_abusive_ip_proxies/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:45:18.000Z</news:publication_date>
      <news:title>Characterizing Abusive IP Proxies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:30:53.000Z</news:publication_date>
      <news:title>In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware</news:title>
    </news:news>
  </url>
</urlset>