<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1svcmfj/do_you_use_a_password_vault_or_are_you_just_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T13:45:04.000Z</news:publication_date>
      <news:title>Do you use a password vault, or are you just a walking memory bank of passwords?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1svbzlb/jaki_laptop_na_cyberbezpieczeństwo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T13:18:12.000Z</news:publication_date>
      <news:title>Jaki laptop na Cyberbezpieczeństwo ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1svbrwj/helping_businesses_with_soc1_and_soc2_readiness/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T13:09:04.000Z</news:publication_date>
      <news:title>Helping Businesses with SOC1 and SOC2 readiness - looking for real-world feedback</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1svasam/toronto_police_seize_sms_blasters_a_cybercrime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T12:24:47.000Z</news:publication_date>
      <news:title>Toronto police seize 'SMS blasters,' a cybercrime weapon never before seen in Canada</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1svahst/llm_guardrails_for_ai_safety_and_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T12:11:18.000Z</news:publication_date>
      <news:title>LLM Guardrails for AI Safety and Security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv9sau/cyber_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T11:36:51.000Z</news:publication_date>
      <news:title>Cyber security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sv98fw/ransomware_explained_how_to_protect_yourself/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T11:07:41.000Z</news:publication_date>
      <news:title>Ransomware Explained: How to Protect Yourself</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sv9303/comprehensive_ransomware_guide_how_attacks_work/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T10:59:40.000Z</news:publication_date>
      <news:title>Comprehensive ransomware guide: How attacks work, real cases (WannaCry, Colonial Pipeline, Kaseya), and actual protection strategies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/china-linked-apt-gopherwhisper-abuses-legitimate-services-in-government-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T10:50:00.000Z</news:publication_date>
      <news:title>China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T10:30:00.000Z</news:publication_date>
      <news:title>Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv8dn8/receiving_unsolicited_facebook_security_codes_via/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T10:19:49.000Z</news:publication_date>
      <news:title>Receiving unsolicited Facebook security codes via email - it's not a phishing mail</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv7p38/tip_for_a_vapt_cybersecurity_job_role_interview/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T09:39:49.000Z</news:publication_date>
      <news:title>Tip for a VAPT Cybersecurity job role Interview for a fresher</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T09:26:00.000Z</news:publication_date>
      <news:title>Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv74lj/flourish_has_access_to_your_microsoft_account/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T09:06:18.000Z</news:publication_date>
      <news:title>"Flourish has access to your microsoft account"</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv6qr4/morpheus_a_new_spyware_linked_to_ips_intelligence/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T08:43:12.000Z</news:publication_date>
      <news:title>Morpheus: A new Spyware linked to IPS Intelligence</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sv6gty/largescale_security_audit_of_1764_vibecoded_apps/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T08:26:49.000Z</news:publication_date>
      <news:title>Large-scale security audit of 1,764 "vibe-coded" apps: 7% have wide-open Supabase DBs, 15% of Bolt apps ship hardcoded API keys, plus IDOR and zero-auth APIs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv6bzb/cto_at_ncsc_summary_week_ending_april_26th/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T08:19:15.000Z</news:publication_date>
      <news:title>CTO at NCSC Summary: week ending April 26th</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sv6aqa/save_time_and_use_zig_to_write_your_malware_poc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T08:17:11.000Z</news:publication_date>
      <news:title>Save time and use Zig to write your Malware POC</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sv5sqy/cracking_castleloaders_inno_setup_password/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T07:48:09.000Z</news:publication_date>
      <news:title>Cracking CastleLoader’s Inno Setup Password</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv4y0l/what_makes_passkeys_so_special/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T06:59:30.000Z</news:publication_date>
      <news:title>What makes passkeys so special?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv4kny/llm_ctf_challenges_can_you_crack_all_13/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T06:38:45.000Z</news:publication_date>
      <news:title>LLM CTF challenges. Can you crack all 13?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv4bsj/gpt55_mythoslike_hacking_open_to_all/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T06:24:27.000Z</news:publication_date>
      <news:title>GPT-5.5: Mythos-Like Hacking, Open To All</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv3qh0/protecting_your_secrets_from_tomorrows_quantum/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T05:51:31.000Z</news:publication_date>
      <news:title>Protecting your secrets from tomorrow’s quantum risks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T05:08:00.000Z</news:publication_date>
      <news:title>CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sv17v2/stix_visualizer_threat_intelligence_graph_explorer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T03:42:32.000Z</news:publication_date>
      <news:title>STIX Visualizer — Threat Intelligence Graph Explorer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv0v7o/what_is_preventing_npm_style_scas_in_homebrew/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T03:25:36.000Z</news:publication_date>
      <news:title>What is preventing npm style SCAs in homebrew?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv0scb/should_i_be_worried_about_ai_advancement_in_cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T03:21:51.000Z</news:publication_date>
      <news:title>Should i be worried about ai advancement in cyber security field?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sv0gtj/will_i_be_safe_to_connect_to_hotel_wifi_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T03:06:48.000Z</news:publication_date>
      <news:title>Will I be safe to connect to hotel wifi with Mullvad?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suzz4e/arctic_wolf_recently_observed_a_large_scale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T02:43:52.000Z</news:publication_date>
      <news:title>Arctic Wolf recently observed a large scale device code phishing campaign leveraging the Kali365 phishing‑as‑a‑service platform to obtain initial access and conduct follow-on activity.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suyfag/what_is_a_best_practice_in_the_industry_that_you/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T01:31:02.000Z</news:publication_date>
      <news:title>What is a "Best Practice" in the industry that you think is actually outdated or ineffective in 2026?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suxu3m/i_put_qwen359b_inside_kali_and_let_it_target_some/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T01:03:58.000Z</news:publication_date>
      <news:title>I put Qwen3.5-9B inside Kali and let it target some Windows machines. Thoughts? Ideas? Opinions? Thanks!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/claude-code-cowork-monitoring-otel-elastic</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:00:00.000Z</news:publication_date>
      <news:title>Monitoring Claude Code/Cowork at scale with OTel in Elastic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:53:14.000Z</news:publication_date>
      <news:title>ADT confirms data breach after ShinyHunters leak threat</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1suuii9/i_built_a_c2_framework_that_uses_discord_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:36:34.000Z</news:publication_date>
      <news:title>I built a C2 framework that uses Discord and Telegram for communication</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sutbtf/opinion_on_claude_mythos_and_firefox/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:48:50.000Z</news:publication_date>
      <news:title>Opinion on Claude mythos and FIrefox?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:40:33.000Z</news:publication_date>
      <news:title>The npm Threat Landscape: Attack Surface and Mitigations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1susnsa/potential_crucial_vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:22:19.000Z</news:publication_date>
      <news:title>potential crucial vulnerability?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1susn6s/firestarter_malware_survives_cisco_firewall/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:21:40.000Z</news:publication_date>
      <news:title>Firestarter malware survives Cisco firewall updates, security patches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sus5of/made_it_to_technical_round_for_soc_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:02:50.000Z</news:publication_date>
      <news:title>Made it to technical round for Soc 1</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surs7t/second_interview/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:48:52.000Z</news:publication_date>
      <news:title>Second Interview</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/section-702-fisa-reauthorization-bill-leaves-critics-unimpressed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:45:17.000Z</news:publication_date>
      <news:title>Latest spy power reauthorization bill leaves critics unimpressed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surob6/snapchat_servers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:44:44.000Z</news:publication_date>
      <news:title>snapchat servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1surm99/detect_shulfar_malware_encrypted_tcp_cc_traffic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:42:34.000Z</news:publication_date>
      <news:title>Detect Shulfar Malware Encrypted TCP C&amp;C Traffic Using PacketSmith Yara-X Detection Module</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surkdb/anything_i_can_do_to_stopreduce_microsoft_auth/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:40:34.000Z</news:publication_date>
      <news:title>Anything I can do to stop/reduce Microsoft auth app requests from random sources?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surfl0/as_an_elastic_security_engineer_what_is_you_day/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:35:28.000Z</news:publication_date>
      <news:title>As an elastic security engineer, what is you day like.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:34:08.000Z</news:publication_date>
      <news:title>Firestarter malware survives Cisco firewall updates, security patches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/new-activity-central-south-america/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:30:19.000Z</news:publication_date>
      <news:title>TGR-STA-1030: New Activity in Central and South America</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sur7g0/failed_interview_hard_ranting/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:27:17.000Z</news:publication_date>
      <news:title>Failed interview hard - ranting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suqz4f/hand_off_from_sentinelone_to_insurance_providers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:18:36.000Z</news:publication_date>
      <news:title>Hand off from SentinelOne to Insurance Provider's DFIR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/windows-update-gets-new-controls-to-reduce-forced-restarts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:08:26.000Z</news:publication_date>
      <news:title>Windows Update gets new controls to reduce forced restarts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suq2kx/media_player_pivot_how_i_got_back_into_my_own/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:44:55.000Z</news:publication_date>
      <news:title>Media player pivot: How I got back into my own server</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1supqng/54_days_of_ssh_honeypot_data_269k_connections_48k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:32:28.000Z</news:publication_date>
      <news:title>54 days of SSH honeypot data: 269K connections, 48K unique passwords, 28 humans</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/iran-cyber-warfare-haugh</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:15:00.000Z</news:publication_date>
      <news:title>Iran’s cyber threat may be less ‘shock and awe’ than ‘low and slow,’ officials say</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ADT-data-breach-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:45:00.000Z</news:publication_date>
      <news:title>ADT says customer data stolen in cyber intrusion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-blackfile-extortion-gang-targets-retail-and-hospitality-orgs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:26:27.000Z</news:publication_date>
      <news:title>New BlackFile extortion group linked to surge of vishing attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:13:55.000Z</news:publication_date>
      <news:title>Microsoft to roll out Entra passkeys on Windows in late April</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sumcfh/a_free_solution_to_the_github_actions_supply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:28:58.000Z</news:publication_date>
      <news:title>A free solution to the GitHub Actions supply chain crisis</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-pack2theroot-flaw-gives-hackers-root-linux-access/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:28:46.000Z</news:publication_date>
      <news:title>New ‘Pack2TheRoot’ flaw gives hackers root Linux access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/pentagon-grapples-with-securing-ai-as-it-moves-towards-autonomous-warfare</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:14:00.000Z</news:publication_date>
      <news:title>Pentagon grapples with securing AI as it moves toward autonomous warfare</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/firestarter-backdoor-hit-federal-cisco.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:06:00.000Z</news:publication_date>
      <news:title>FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/us-busts-myanmar-ring-targeting-us-citizens-financial-fraud</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:48:04.000Z</news:publication_date>
      <news:title>US Busts Myanmar Ring Targeting US Citizens in Financial Fraud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sul6vj/whats_with_this_error_detected/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:47:49.000Z</news:publication_date>
      <news:title>What's with this error? Detected: Trojan:Win32/Suschil!rfn</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sul6ic/virustotal_is_helpful_do_ai_agents_need_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:47:25.000Z</news:publication_date>
      <news:title>VirusTotal is helpful. Do AI agents need a different type of scanner?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sul66b/bitwarden_cli_compromesso_attacco_supply_chain/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:47:05.000Z</news:publication_date>
      <news:title>Bitwarden CLI compromesso: attacco supply chain viola npm Trusted Publishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suksxl/backdoor_firestarter_cisa_aggiorna_la_direttiva/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:33:44.000Z</news:publication_date>
      <news:title>Backdoor FIRESTARTER: CISA aggiorna la direttiva dopo violazione federale</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sukrbu/unc6692_nuova_minaccia_teams_colpisce_decisori/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:32:08.000Z</news:publication_date>
      <news:title>UNC6692: nuova minaccia Teams colpisce decisori aziendali</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sukjpu/app_ue_verifica_età_hackerata_in_2_minuti_il_gap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:24:33.000Z</news:publication_date>
      <news:title>App UE verifica età hackerata in 2 minuti: il gap tra promesse e realtà</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sukho8/app_ue_verifica_età_hackerata_in_2_minuti_il_gap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:22:35.000Z</news:publication_date>
      <news:title>App UE verifica età hackerata in 2 minuti: il gap tra promesse e realtà</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sukfsn/automated_reverse_engineering_of_malicious/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:20:38.000Z</news:publication_date>
      <news:title>Automated reverse engineering of malicious android streaming boxes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sukfj1/exploit_su_lmdeploy_cve202633626_attacco_ssrf/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:20:23.000Z</news:publication_date>
      <news:title>Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sujye8/ai_hacking_fears_jolt_washington_as_anthropic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:03:36.000Z</news:publication_date>
      <news:title>AI hacking fears jolt Washington as Anthropic unveils Mythos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-17-7/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:48:28.000Z</news:publication_date>
      <news:title>The Good, the Bad and the Ugly in Cybersecurity – Week 17</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suj683/microsoft_defender_ml_flagging_all_adobe_urls/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:35:39.000Z</news:publication_date>
      <news:title>Microsoft Defender ML flagging all Adobe URLs… again</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suj19t/google_took_70_days_to_remove_music_downloader/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:30:27.000Z</news:publication_date>
      <news:title>Google took 70 days to remove "Music Downloader - VKsaver" after it was publicly disclosed as malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/the-latest-push-to-extend-key-us-spy-powers-is-still-a-mess/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:10:03.000Z</news:publication_date>
      <news:title>The Latest Push to Extend Key US Spy Powers Is Still a Mess</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/glasswing-secured-code-stack-on-you</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:04:29.000Z</news:publication_date>
      <news:title>Glasswing Secured the Code. The Rest of Your Stack Is Still on You</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/pre-stuxnet-sabotage-malware-fast16-linked-to-us-iran-cyber-tensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:57:18.000Z</news:publication_date>
      <news:title>Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/norway-prime-minister-proposes-social-media-ban-for-young-teens</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:41:00.000Z</news:publication_date>
      <news:title>Norway's prime minister proposes ban on social media access for young teens</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suhjfu/another_spyware_maker_caught_distributing_fake/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:36:22.000Z</news:publication_date>
      <news:title>Another spyware maker caught distributing fake Android snooping apps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/in-other-news-unauthorized-mythos-access-plankey-cisa-nomination-ends-new-display-security-device/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:31:51.000Z</news:publication_date>
      <news:title>In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suh47t/cohere_terrarium_cve20265752_and_openai_codex_cli/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:20:13.000Z</news:publication_date>
      <news:title>Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sugxr8/a1m_axiom1_sovereign_matrix_for_governing_output/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:13:20.000Z</news:publication_date>
      <news:title>A1M (AXIOM-1 Sovereign Matrix) for Governing Output Reliability in Stochastic Language Models</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:13:00.000Z</news:publication_date>
      <news:title>NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/dora-and-operational-resilience-credential-management-as-a-financial-risk-control/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:10:20.000Z</news:publication_date>
      <news:title>DORA and operational resilience: Credential management as a financial risk control</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sugqot/best_applications_for_learning_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:05:45.000Z</news:publication_date>
      <news:title>Best applications for learning cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sugb2p/hackers_text_me_please/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:48:56.000Z</news:publication_date>
      <news:title>Hackers text me please</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/canada-sms-blaster-cybercriminals</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:45:00.000Z</news:publication_date>
      <news:title>Toronto police arrest three in Canada’s first mobile SMS blaster case</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-says-zimbra-flaw-now-exploited-over-10k-servers-vulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:35:33.000Z</news:publication_date>
      <news:title>Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sufvza/tryhackme_teaches_security_yet_can_not_comply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:32:21.000Z</news:publication_date>
      <news:title>TryHackMe teaches security yet can not comply with a GDPR request.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/ai-phishing-no-1-cyberattackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:30:00.000Z</news:publication_date>
      <news:title>AI Phishing Is No. 1 With a Bullet for Cyberattackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/uk-biobank-data-beach-health-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:25:00.000Z</news:publication_date>
      <news:title>UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sufdoq/shinyhunters_threaten_to_leak_14_million_udemy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:12:14.000Z</news:publication_date>
      <news:title>ShinyHunters threaten to leak 1.4 million Udemy records containing private data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/north-koreas-lazarus-targets-macos-users-clickfix</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:00:00.000Z</news:publication_date>
      <news:title>North Korea's Lazarus Targets macOS Users via ClickFix</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ncsc-passkey-adoption-cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:54:12.000Z</news:publication_date>
      <news:title>Users advised to drop passwords and make room for passkeys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sueoqu/shinyhunters_claims_sale_of_anthropic_claude/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:44:18.000Z</news:publication_date>
      <news:title>ShinyHunters Claims Sale of Anthropic Claude Mythos AI Model Data and Internal Documents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/why-cybersecurity-must-rethink-defense-in-the-age-of-autonomous-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:34:53.000Z</news:publication_date>
      <news:title>Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/medical-data-of-500000-uk-volunteers-listed-for-sale-on-alibaba</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:32:20.000Z</news:publication_date>
      <news:title>Medical data of 500,000 UK volunteers listed for sale on Alibaba</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/locked-shields-2026-41-nations-strengthen-cyber-resilience-in-worlds-biggest-exercise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:32:08.000Z</news:publication_date>
      <news:title>Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/indirect-prompt-injection-in-the-wild/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:27:25.000Z</news:publication_date>
      <news:title>Indirect prompt injection is taking hold in the wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ai-old-cybersecurity-mistakes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:10:00.000Z</news:publication_date>
      <news:title>AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/24/cisa-adds-four-known-exploited-vulnerabilities-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bridging-ai-agent-authority-gap.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:49:00.000Z</news:publication_date>
      <news:title>Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/26-fakewallet-apps-found-on-apple-app.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:48:00.000Z</news:publication_date>
      <news:title>26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-now-lets-admins-uninstall-copilot-on-enterprise-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:38:00.000Z</news:publication_date>
      <news:title>Microsoft now lets admins uninstall Copilot on enterprise devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sud0xz/how_can_i_learn_about_web_security_quickly/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:28:56.000Z</news:publication_date>
      <news:title>How can I learn about Web Security quickly ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/us-federal-agencys-cisco-firewall-infected-with-firestarter-backdoor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:26:09.000Z</news:publication_date>
      <news:title>US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trump-administration-vows-crackdown-on-chinese-companies-exploiting-ai-models-made-in-us/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:13:55.000Z</news:publication_date>
      <news:title>Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sucppo/how_do_you_deal_with_log_overload_and_alert/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:13:37.000Z</news:publication_date>
      <news:title>How do you deal with log overload and alert fatigue?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suceqt/security_breach_and_credentials_phished/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:58:48.000Z</news:publication_date>
      <news:title>Security Breach and credentials Phished</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suc3ye/bitwarden_cli_was_compromised/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:43:07.000Z</news:publication_date>
      <news:title>Bitwarden CLI Was Compromised</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://ics-cert.kaspersky.com/publications/reports/2026/04/24/threat-landscape-for-industrial-automation-systems-middle-east-q4-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:31:08.000Z</news:publication_date>
      <news:title>Threat landscape for industrial automation systems. Middle East, Q4 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1subvhw/proofpoint_email_security_manager_audit_logs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:30:41.000Z</news:publication_date>
      <news:title>Proofpoint Email Security / Manager Audit Logs Forwarding to SIEM through Syslog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1subt84/udemy_compromise_reported/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:27:25.000Z</news:publication_date>
      <news:title>Udemy compromise reported</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1subt3q/costeffective_dns_security_infoblox_vs_cloudflare/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:27:13.000Z</news:publication_date>
      <news:title>Cost-Effective DNS Security: Infoblox vs Cloudflare (and Alternatives?)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ncsc-china-covert-networks-advisory/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:59:11.000Z</news:publication_date>
      <news:title>Compromised everyday devices power Chinese cyber espionage operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/cisco-firepower-firestarter-backdoor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:56:31.000Z</news:publication_date>
      <news:title>New Cisco firewall malware can only be killed by pulling the plug</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/vulnerabilities-patched-in-crowdstrike-tenable-products/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:49:27.000Z</news:publication_date>
      <news:title>Vulnerabilities Patched in CrowdStrike, Tenable Products</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suaupb/what_really_happened_in_there_a_tamperevident/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:33:38.000Z</news:publication_date>
      <news:title>What Really Happened In There? A Tamper-Evident Audit Trail for AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:29:00.000Z</news:publication_date>
      <news:title>Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suarh7/advice_on_my_cybersecurity_cert_path_cdsa_cpts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:28:11.000Z</news:publication_date>
      <news:title>Advice on my cybersecurity cert path (CDSA, CPTS, AWS SAA, AZ-500)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/meta-account-settings-overview/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:19:27.000Z</news:publication_date>
      <news:title>Meta is overhauling how you sign in, manage settings, and protect your accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.welivesecurity.com/en/ransomware/calm-ransom-what-you-see-is-not-all-there-is/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:00:00.000Z</news:publication_date>
      <news:title>The calm before the ransom: What you see is not all there is</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su9hc8/sicherheitslücke_in_geutebrückkameras/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:12:17.000Z</news:publication_date>
      <news:title>Sicherheitslücke in Geutebrück-Kameras: Befehlsinjektion ermöglichte Root-Zugriff über Weboberfläche</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/npm-supply-chain-worm-canister/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:10:00.000Z</news:publication_date>
      <news:title>Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/bitwarden-npm-package-hit-in-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:07:02.000Z</news:publication_date>
      <news:title>Bitwarden NPM Package Hit in Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ubuntu-26-04-lts-resolute-raccoon-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:48:55.000Z</news:publication_date>
      <news:title>Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/copperhelm-raises-7-million-for-agentic-cloud-security-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:31:09.000Z</news:publication_date>
      <news:title>Copperhelm Raises $7 Million for Agentic Cloud Security Platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:24:00.000Z</news:publication_date>
      <news:title>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/openai-gpt-5-5-cybersecurity-safeguards/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:03:44.000Z</news:publication_date>
      <news:title>OpenAI’s GPT-5.5 is out with expanded cybersecurity safeguards</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su7whd/kyber_ransomware_gang_toys_with_postquantum/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:39:56.000Z</news:publication_date>
      <news:title>Kyber ransomware gang toys with post-quantum encryption on Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su7ovk/cisa_the_uks_ncsc_and_global_partners_warn_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:27:39.000Z</news:publication_date>
      <news:title>CISA, the UK’s NCSC and global partners warn of Chinese state-linked covert cyber networks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su7iif/captcha_opening_when_site_opened_for_firstime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:17:34.000Z</news:publication_date>
      <news:title>Captcha Opening when Site opened for Firstime</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/cisa/cybersecurity-agencies-flags-use-of-covert-networks-by-china-linked-actors-for-espionage-offensive-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:13:29.000Z</news:publication_date>
      <news:title>Cybersecurity agencies flags use of covert networks by China-linked actors for espionage, offensive operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/cato-traces-large-scale-modbus-tcp-activity-targeting-plcs-exposing-persistent-gaps-in-ot-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:03:56.000Z</news:publication_date>
      <news:title>Cato traces large-scale Modbus/TCP activity targeting PLCs, exposing persistent gaps in OT security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/dragos-dismisses-zionsiphon-narrative-says-code-flaws-and-weak-ics-logic-render-ot-malware-operationally-ineffective/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:59:42.000Z</news:publication_date>
      <news:title>Dragos dismisses ZionSiphon narrative, says code flaws and weak ICS logic render OT malware operationally ineffective</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su6z16/plc_cybersecurity_securing_industrial_control/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:47:27.000Z</news:publication_date>
      <news:title>PLC Cybersecurity — Securing Industrial Control Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/kaja-ciglic-microsoft-nation-state-cyber-programs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:30:29.000Z</news:publication_date>
      <news:title>AI is speeding up nation-state cyber programs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su6m12/firestarterbackdoor_cisa_und_ncsc_warnen_vor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:27:49.000Z</news:publication_date>
      <news:title>FIRESTARTER-Backdoor: CISA und NCSC warnen vor APT-Malware auf Cisco-Firewalls</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/android-privacy-policy-logging-research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:00:57.000Z</news:publication_date>
      <news:title>A study of 1,000 Android apps finds a privacy policy logging gap</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su5wy5/can_anyone_tell_me_the_test_cases_after_the_3rd/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:51:54.000Z</news:publication_date>
      <news:title>Can anyone tell me the test cases after the 3rd one in this tool?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1su5ugt/fast16_mystery_shadowbrokers_reference_reveals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:48:33.000Z</news:publication_date>
      <news:title>fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su5t04/high_school_junior_with_zero_experience_how_do_i/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:46:29.000Z</news:publication_date>
      <news:title>High school junior with zero experience — how do I start learning cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/2026-global-it-spending-forecast/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:30:12.000Z</news:publication_date>
      <news:title>IT spending to hit $6.31 trillion record, thanks to AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su5esk/sitewall_waf_function/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:26:51.000Z</news:publication_date>
      <news:title>Sitewall WAF function</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su57o5/vmware_setting_up_isolated_environment_but_need/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:17:02.000Z</news:publication_date>
      <news:title>VMWare - Setting up isolated environment but need to be able to connect to the internet?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ai-in-ci-cd-engineering-teams/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:00:20.000Z</news:publication_date>
      <news:title>Where AI in CI/CD is working for engineering teams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1su3l2z/fixing_the_exploit_didnt_fix_the_system_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:59:39.000Z</news:publication_date>
      <news:title>Fixing the Exploit Didn’t Fix the System: An Exploration of Trust Boundaries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su3ama/claude_for_android_source_code/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:46:21.000Z</news:publication_date>
      <news:title>Claude for Android Source Code</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su394i/can_someone_tell_me_what_this_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:44:28.000Z</news:publication_date>
      <news:title>Can someone tell me what this Cybersecurity dataset is about? Is this data related to a Cobalt Strike malware incident?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su2v59/the_mythos_breach_breakdown_no_zeroday_needed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:26:30.000Z</news:publication_date>
      <news:title>The Mythos "breach" breakdown — no zero-day needed, just a supply chain failure and a leaked URL convention. Here's the full attack chain.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1su2evy/why_purellm_ctfs_dont_work_a_hybrid_architecture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:05:37.000Z</news:publication_date>
      <news:title>Why Pure-LLM CTFs Don't Work: A Hybrid Architecture for AI Security Challenges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32924</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/chinese-apt-abuses-cloud-tools-spy-mongolia</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:00:00.000Z</news:publication_date>
      <news:title>Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/tropic-trooper-apt-takes-aim-home-routers-japanese-targets</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:00:00.000Z</news:publication_date>
      <news:title>Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stzy3s/the_behavioral_shift_why_trusted_relationships/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:12:20.000Z</news:publication_date>
      <news:title>The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/rethinking-threat-intelligence-in-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:00:00.000Z</news:publication_date>
      <news:title>From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stywcz/mythos_and_traditional_appsec/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:25:46.000Z</news:publication_date>
      <news:title>Mythos and traditional AppSec</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sty77p/newly_deciphered_sabotage_malware_may_have/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:55:55.000Z</news:publication_date>
      <news:title>Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1stxtw3/bitwarden_cli_compromised_in_ongoing_checkmarx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:40:20.000Z</news:publication_date>
      <news:title>Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain ...</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1stxk5z/uk_biobank_health_data_of_500k_listed_for_sale_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:29:12.000Z</news:publication_date>
      <news:title>UK Biobank Health Data of 500K Listed for Sale in China</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stxa7g/what_are_the_minimum_security_policies_a_small/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:52.000Z</news:publication_date>
      <news:title>What are the minimum security policies a small team actually needs?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/vercel-attack-fallout-expands/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:05:51.000Z</news:publication_date>
      <news:title>Vercel attack fallout expands to more customers and third-party systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/fast16-malware-stuxnet-precursor-iran-nuclear-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:00:00.000Z</news:publication_date>
      <news:title>Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stwp88/are_security_workflows_shifting_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:54:41.000Z</news:publication_date>
      <news:title>Are security workflows shifting from detection-first to validation-first?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1stwiff/psa_awstorecloud_is_a_malicious_fake_claude_api/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:47:17.000Z</news:publication_date>
      <news:title>PSA: awstore.cloud is a MALICIOUS fake Claude API provider - warn your fellow devs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stwgaw/recent_college_graduate_with_a_bachelors_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:44:57.000Z</news:publication_date>
      <news:title>Recent College Graduate with a bachelors and masters in Computer Science. Looking for advise for what to do next when trying to get jobs, outside of certifications.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:33:45.000Z</news:publication_date>
      <news:title>Hackers exploit file upload bug in Breeze Cache WordPress plugin</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stvuy8/i_feel_bad_for_turning_down_an_ot_opportunity_can/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:22:07.000Z</news:publication_date>
      <news:title>I feel bad for turning down an OT opportunity, can you cheer me up?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stvskz/attempted_hack_on_my_microsoft_account_was_it_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:19:35.000Z</news:publication_date>
      <news:title>Attempted hack on my Microsoft account. Was it a VPN node?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/china-hackers-industrializing-botnets</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:52:24.000Z</news:publication_date>
      <news:title>China-Backed Hackers Are Industrializing Botnets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/frontier-ai-top-questions-answered/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:45:50.000Z</news:publication_date>
      <news:title>Frontier AI and the Future of Defense: Your Top Questions Answered</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/cisco-firestarter-malware-cisa-warning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:25:05.000Z</news:publication_date>
      <news:title>US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/us-sanctions-cambodian-senator-scam-compounds</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:07:00.000Z</news:publication_date>
      <news:title>US sanctions Cambodian senator for millions earned through scam compounds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sttosq/bitwarden_cli_npm_package_compromised_to_steal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:01:05.000Z</news:publication_date>
      <news:title>Bitwarden CLI npm package compromised to steal developer credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/dragos-zionsiphon-ai-malware-targeting-water-sector-hype/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:50:24.000Z</news:publication_date>
      <news:title>Dragos: Despite AI use, new malware targeting water plants is ‘hype’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:21:01.000Z</news:publication_date>
      <news:title>Bitwarden CLI npm package compromised to steal developer credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-telecom-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:19:32.000Z</news:publication_date>
      <news:title>Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cisa-us-agency-breached-cisco-vulnerability-backdoor</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:03:00.000Z</news:publication_date>
      <news:title>CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:59:39.000Z</news:publication_date>
      <news:title>Trigona ransomware attacks use custom exfiltration tool to steal data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/surveillance-companies-exploiting-telecom-systems-to-track-location</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:43:00.000Z</news:publication_date>
      <news:title>Surveillance companies exploiting telecom system to spy on targets’ locations, research shows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1str4k9/cve202634621_adobe_acrobat_reader_zeroday_was_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:27:39.000Z</news:publication_date>
      <news:title>CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:16:00.000Z</news:publication_date>
      <news:title>UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stqivn/opportunity_to_pivot_from_technical_writing_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:06:32.000Z</news:publication_date>
      <news:title>Opportunity to pivot from Technical Writing to GRC AI Governance (with a bad catch)... Need advice!!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stq84j/realistic_entrepreneurship_paths_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:56:13.000Z</news:publication_date>
      <news:title>Realistic entrepreneurship paths in cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stppt3/anyone_pursuing_btech_cybersecurity_from_upsifs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:38:27.000Z</news:publication_date>
      <news:title>Anyone pursuing btech cybersecurity from upsifs lucknow? How's your experience till now?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sto6j0/final_interview_with_the_ciso_tomorrow_any_advice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:45:08.000Z</news:publication_date>
      <news:title>Final interview with the CISO tomorrow, any advice?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/google-gemini-over-cyber-specific/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:40:00.000Z</news:publication_date>
      <news:title>Google Favors General‑Purpose Gemini Models Over Cybersecurity‑Specific AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/5-steps-to-become-mythos-ready-ai-cybersecurity</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:18:00.000Z</news:publication_date>
      <news:title>Five steps to become Mythos ready</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/china-nexus-covert-networks-advisory/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:13:51.000Z</news:publication_date>
      <news:title>A dozen allied agencies say China is building covert hacker networks out of everyday routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:05:12.000Z</news:publication_date>
      <news:title>New Checkmarx supply-chain breach affects KICS analysis tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/china-linked-hackers-target-mongolian-gov-slack-discord</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:03:00.000Z</news:publication_date>
      <news:title>China-linked hackers targeted Mongolian government using Slack, Discord for covert communications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1stmva0/oauth_20_bcp_414_reuse_detection_in_practice_race/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:57:57.000Z</news:publication_date>
      <news:title>OAuth 2.0 BCP §4.14 reuse detection in practice — race vs theft disambiguation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/privacy/2026/04/how-cyberattacks-on-companies-affect-everyone</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:34:09.000Z</news:publication_date>
      <news:title>How cyberattacks on companies affect everyone</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/cloudsmith-raises-72-million-in-series-c-funding/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:03:59.000Z</news:publication_date>
      <news:title>Cloudsmith Raises $72 Million in Series C Funding</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/hexagonalrodent-north-korean-hackers-targeting-developers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:56:46.000Z</news:publication_date>
      <news:title>With AI’s help, North Korean hackers stumbled into a near-undetectable attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stl5h9/i_gave_some_experienced_grc_folks_a_few_ai_risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:56:33.000Z</news:publication_date>
      <news:title>I gave some experienced GRC folks a few AI risk scenarios. Most scored around 60 percent. Curious how you would answer these.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stl0fq/bitwarden_cli_compromised_in_ongoing_checkmarx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:51:29.000Z</news:publication_date>
      <news:title>Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign</news:title>
    </news:news>
  </url>
</urlset>