<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.elastic.co/security-labs/claude-code-cowork-monitoring-otel-elastic</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:00:00.000Z</news:publication_date>
      <news:title>Monitoring Claude Code/Cowork at scale with OTel in Elastic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1suuii9/i_built_a_c2_framework_that_uses_discord_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:36:34.000Z</news:publication_date>
      <news:title>I built a C2 framework that uses Discord and Telegram for communication</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sutbtf/opinion_on_claude_mythos_and_firefox/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:48:50.000Z</news:publication_date>
      <news:title>Opinion on Claude mythos and FIrefox?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:40:33.000Z</news:publication_date>
      <news:title>The npm Threat Landscape: Attack Surface and Mitigations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1susnsa/potential_crucial_vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:22:19.000Z</news:publication_date>
      <news:title>potential crucial vulnerability?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1susn6s/firestarter_malware_survives_cisco_firewall/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:21:40.000Z</news:publication_date>
      <news:title>Firestarter malware survives Cisco firewall updates, security patches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sus5of/made_it_to_technical_round_for_soc_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:02:50.000Z</news:publication_date>
      <news:title>Made it to technical round for Soc 1</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surs7t/second_interview/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:48:52.000Z</news:publication_date>
      <news:title>Second Interview</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/section-702-fisa-reauthorization-bill-leaves-critics-unimpressed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:45:17.000Z</news:publication_date>
      <news:title>Latest spy power reauthorization bill leaves critics unimpressed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surob6/snapchat_servers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:44:44.000Z</news:publication_date>
      <news:title>snapchat servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1surm99/detect_shulfar_malware_encrypted_tcp_cc_traffic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:42:34.000Z</news:publication_date>
      <news:title>Detect Shulfar Malware Encrypted TCP C&amp;C Traffic Using PacketSmith Yara-X Detection Module</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surkdb/anything_i_can_do_to_stopreduce_microsoft_auth/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:40:34.000Z</news:publication_date>
      <news:title>Anything I can do to stop/reduce Microsoft auth app requests from random sources?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1surfl0/as_an_elastic_security_engineer_what_is_you_day/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:35:28.000Z</news:publication_date>
      <news:title>As an elastic security engineer, what is you day like.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:34:08.000Z</news:publication_date>
      <news:title>Firestarter malware survives Cisco firewall updates, security patches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/new-activity-central-south-america/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:30:19.000Z</news:publication_date>
      <news:title>TGR-STA-1030: New Activity in Central and South America</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sur7g0/failed_interview_hard_ranting/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:27:17.000Z</news:publication_date>
      <news:title>Failed interview hard - ranting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/windows-update-gets-new-controls-to-reduce-forced-restarts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:08:26.000Z</news:publication_date>
      <news:title>Windows Update gets new controls to reduce forced restarts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suq2kx/media_player_pivot_how_i_got_back_into_my_own/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:44:55.000Z</news:publication_date>
      <news:title>Media player pivot: How I got back into my own server</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1supqng/54_days_of_ssh_honeypot_data_269k_connections_48k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:32:28.000Z</news:publication_date>
      <news:title>54 days of SSH honeypot data: 269K connections, 48K unique passwords, 28 humans</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/iran-cyber-warfare-haugh</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:15:00.000Z</news:publication_date>
      <news:title>Iran’s cyber threat may be less ‘shock and awe’ than ‘low and slow,’ officials say</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/ADT-data-breach-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:45:00.000Z</news:publication_date>
      <news:title>ADT says customer data stolen in cyber intrusion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-blackfile-extortion-gang-targets-retail-and-hospitality-orgs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:26:27.000Z</news:publication_date>
      <news:title>New BlackFile extortion group linked to surge of vishing attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:13:55.000Z</news:publication_date>
      <news:title>Microsoft to roll out Entra passkeys on Windows in late April</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sumcfh/a_free_solution_to_the_github_actions_supply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:28:58.000Z</news:publication_date>
      <news:title>A free solution to the GitHub Actions supply chain crisis</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-pack2theroot-flaw-gives-hackers-root-linux-access/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:28:46.000Z</news:publication_date>
      <news:title>New ‘Pack2TheRoot’ flaw gives hackers root Linux access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/pentagon-grapples-with-securing-ai-as-it-moves-towards-autonomous-warfare</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:14:00.000Z</news:publication_date>
      <news:title>Pentagon grapples with securing AI as it moves toward autonomous warfare</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/firestarter-backdoor-hit-federal-cisco.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:06:00.000Z</news:publication_date>
      <news:title>FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/us-busts-myanmar-ring-targeting-us-citizens-financial-fraud</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:48:04.000Z</news:publication_date>
      <news:title>US Busts Myanmar Ring Targeting US Citizens in Financial Fraud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sul6vj/whats_with_this_error_detected/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:47:49.000Z</news:publication_date>
      <news:title>What's with this error? Detected: Trojan:Win32/Suschil!rfn</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sul6ic/virustotal_is_helpful_do_ai_agents_need_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:47:25.000Z</news:publication_date>
      <news:title>VirusTotal is helpful. Do AI agents need a different type of scanner?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sul66b/bitwarden_cli_compromesso_attacco_supply_chain/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:47:05.000Z</news:publication_date>
      <news:title>Bitwarden CLI compromesso: attacco supply chain viola npm Trusted Publishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suksxl/backdoor_firestarter_cisa_aggiorna_la_direttiva/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:33:44.000Z</news:publication_date>
      <news:title>Backdoor FIRESTARTER: CISA aggiorna la direttiva dopo violazione federale</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sukrbu/unc6692_nuova_minaccia_teams_colpisce_decisori/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:32:08.000Z</news:publication_date>
      <news:title>UNC6692: nuova minaccia Teams colpisce decisori aziendali</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sukjpu/app_ue_verifica_età_hackerata_in_2_minuti_il_gap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:24:33.000Z</news:publication_date>
      <news:title>App UE verifica età hackerata in 2 minuti: il gap tra promesse e realtà</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sukho8/app_ue_verifica_età_hackerata_in_2_minuti_il_gap/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:22:35.000Z</news:publication_date>
      <news:title>App UE verifica età hackerata in 2 minuti: il gap tra promesse e realtà</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sukfsn/automated_reverse_engineering_of_malicious/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:20:38.000Z</news:publication_date>
      <news:title>Automated reverse engineering of malicious android streaming boxes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sukfj1/exploit_su_lmdeploy_cve202633626_attacco_ssrf/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:20:23.000Z</news:publication_date>
      <news:title>Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sujye8/ai_hacking_fears_jolt_washington_as_anthropic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:03:36.000Z</news:publication_date>
      <news:title>AI hacking fears jolt Washington as Anthropic unveils Mythos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-17-7/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:48:28.000Z</news:publication_date>
      <news:title>The Good, the Bad and the Ugly in Cybersecurity – Week 17</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suj683/microsoft_defender_ml_flagging_all_adobe_urls/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:35:39.000Z</news:publication_date>
      <news:title>Microsoft Defender ML flagging all Adobe URLs… again</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suj19t/google_took_70_days_to_remove_music_downloader/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:30:27.000Z</news:publication_date>
      <news:title>Google took 70 days to remove "Music Downloader - VKsaver" after it was publicly disclosed as malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/the-latest-push-to-extend-key-us-spy-powers-is-still-a-mess/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:10:03.000Z</news:publication_date>
      <news:title>The Latest Push to Extend Key US Spy Powers Is Still a Mess</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/glasswing-secured-code-stack-on-you</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:04:29.000Z</news:publication_date>
      <news:title>Glasswing Secured the Code. The Rest of Your Stack Is Still on You</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/pre-stuxnet-sabotage-malware-fast16-linked-to-us-iran-cyber-tensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:57:18.000Z</news:publication_date>
      <news:title>Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/norway-prime-minister-proposes-social-media-ban-for-young-teens</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:41:00.000Z</news:publication_date>
      <news:title>Norway's prime minister proposes ban on social media access for young teens</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suhjfu/another_spyware_maker_caught_distributing_fake/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:36:22.000Z</news:publication_date>
      <news:title>Another spyware maker caught distributing fake Android snooping apps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/in-other-news-unauthorized-mythos-access-plankey-cisa-nomination-ends-new-display-security-device/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:31:51.000Z</news:publication_date>
      <news:title>In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suh47t/cohere_terrarium_cve20265752_and_openai_codex_cli/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:20:13.000Z</news:publication_date>
      <news:title>Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sugxr8/a1m_axiom1_sovereign_matrix_for_governing_output/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:13:20.000Z</news:publication_date>
      <news:title>A1M (AXIOM-1 Sovereign Matrix) for Governing Output Reliability in Stochastic Language Models</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:13:00.000Z</news:publication_date>
      <news:title>NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/dora-and-operational-resilience-credential-management-as-a-financial-risk-control/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:10:20.000Z</news:publication_date>
      <news:title>DORA and operational resilience: Credential management as a financial risk control</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sugqot/best_applications_for_learning_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:05:45.000Z</news:publication_date>
      <news:title>Best applications for learning cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sugb2p/hackers_text_me_please/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:48:56.000Z</news:publication_date>
      <news:title>Hackers text me please</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/canada-sms-blaster-cybercriminals</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:45:00.000Z</news:publication_date>
      <news:title>Toronto police arrest three in Canada’s first mobile SMS blaster case</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-says-zimbra-flaw-now-exploited-over-10k-servers-vulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:35:33.000Z</news:publication_date>
      <news:title>Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sufvza/tryhackme_teaches_security_yet_can_not_comply/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:32:21.000Z</news:publication_date>
      <news:title>TryHackMe teaches security yet can not comply with a GDPR request.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/ai-phishing-no-1-cyberattackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:30:00.000Z</news:publication_date>
      <news:title>AI Phishing Is No. 1 With a Bullet for Cyberattackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/uk-biobank-data-beach-health-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:25:00.000Z</news:publication_date>
      <news:title>UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sufdoq/shinyhunters_threaten_to_leak_14_million_udemy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:12:14.000Z</news:publication_date>
      <news:title>ShinyHunters threaten to leak 1.4 million Udemy records containing private data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/north-koreas-lazarus-targets-macos-users-clickfix</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T13:00:00.000Z</news:publication_date>
      <news:title>North Korea's Lazarus Targets macOS Users via ClickFix</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ncsc-passkey-adoption-cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:54:12.000Z</news:publication_date>
      <news:title>Users advised to drop passwords and make room for passkeys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sueoqu/shinyhunters_claims_sale_of_anthropic_claude/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:44:18.000Z</news:publication_date>
      <news:title>ShinyHunters Claims Sale of Anthropic Claude Mythos AI Model Data and Internal Documents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/why-cybersecurity-must-rethink-defense-in-the-age-of-autonomous-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:34:53.000Z</news:publication_date>
      <news:title>Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/medical-data-of-500000-uk-volunteers-listed-for-sale-on-alibaba</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:32:20.000Z</news:publication_date>
      <news:title>Medical data of 500,000 UK volunteers listed for sale on Alibaba</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/locked-shields-2026-41-nations-strengthen-cyber-resilience-in-worlds-biggest-exercise/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:32:08.000Z</news:publication_date>
      <news:title>Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/indirect-prompt-injection-in-the-wild/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:27:25.000Z</news:publication_date>
      <news:title>Indirect prompt injection is taking hold in the wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ai-old-cybersecurity-mistakes/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:10:00.000Z</news:publication_date>
      <news:title>AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/24/cisa-adds-four-known-exploited-vulnerabilities-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bridging-ai-agent-authority-gap.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:49:00.000Z</news:publication_date>
      <news:title>Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/26-fakewallet-apps-found-on-apple-app.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:48:00.000Z</news:publication_date>
      <news:title>26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-now-lets-admins-uninstall-copilot-on-enterprise-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:38:00.000Z</news:publication_date>
      <news:title>Microsoft now lets admins uninstall Copilot on enterprise devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sud0xz/how_can_i_learn_about_web_security_quickly/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:28:56.000Z</news:publication_date>
      <news:title>How can I learn about Web Security quickly ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/us-federal-agencys-cisco-firewall-infected-with-firestarter-backdoor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:26:09.000Z</news:publication_date>
      <news:title>US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trump-administration-vows-crackdown-on-chinese-companies-exploiting-ai-models-made-in-us/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:13:55.000Z</news:publication_date>
      <news:title>Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sucppo/how_do_you_deal_with_log_overload_and_alert/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:13:37.000Z</news:publication_date>
      <news:title>How do you deal with log overload and alert fatigue?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suceqt/security_breach_and_credentials_phished/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:58:48.000Z</news:publication_date>
      <news:title>Security Breach and credentials Phished</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suc3ye/bitwarden_cli_was_compromised/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:43:07.000Z</news:publication_date>
      <news:title>Bitwarden CLI Was Compromised</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://ics-cert.kaspersky.com/publications/reports/2026/04/24/threat-landscape-for-industrial-automation-systems-middle-east-q4-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:31:08.000Z</news:publication_date>
      <news:title>Threat landscape for industrial automation systems. Middle East, Q4 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1subvhw/proofpoint_email_security_manager_audit_logs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:30:41.000Z</news:publication_date>
      <news:title>Proofpoint Email Security / Manager Audit Logs Forwarding to SIEM through Syslog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1subt84/udemy_compromise_reported/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:27:25.000Z</news:publication_date>
      <news:title>Udemy compromise reported</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1subt3q/costeffective_dns_security_infoblox_vs_cloudflare/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:27:13.000Z</news:publication_date>
      <news:title>Cost-Effective DNS Security: Infoblox vs Cloudflare (and Alternatives?)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ncsc-china-covert-networks-advisory/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:59:11.000Z</news:publication_date>
      <news:title>Compromised everyday devices power Chinese cyber espionage operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/cisco-firepower-firestarter-backdoor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:56:31.000Z</news:publication_date>
      <news:title>New Cisco firewall malware can only be killed by pulling the plug</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/vulnerabilities-patched-in-crowdstrike-tenable-products/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:49:27.000Z</news:publication_date>
      <news:title>Vulnerabilities Patched in CrowdStrike, Tenable Products</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1suaupb/what_really_happened_in_there_a_tamperevident/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:33:38.000Z</news:publication_date>
      <news:title>What Really Happened In There? A Tamper-Evident Audit Trail for AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:29:00.000Z</news:publication_date>
      <news:title>Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1suarh7/advice_on_my_cybersecurity_cert_path_cdsa_cpts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:28:11.000Z</news:publication_date>
      <news:title>Advice on my cybersecurity cert path (CDSA, CPTS, AWS SAA, AZ-500)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/meta-account-settings-overview/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:19:27.000Z</news:publication_date>
      <news:title>Meta is overhauling how you sign in, manage settings, and protect your accounts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su9hc8/sicherheitslücke_in_geutebrückkameras/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:12:17.000Z</news:publication_date>
      <news:title>Sicherheitslücke in Geutebrück-Kameras: Befehlsinjektion ermöglichte Root-Zugriff über Weboberfläche</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/npm-supply-chain-worm-canister/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:10:00.000Z</news:publication_date>
      <news:title>Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/bitwarden-npm-package-hit-in-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:07:02.000Z</news:publication_date>
      <news:title>Bitwarden NPM Package Hit in Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ubuntu-26-04-lts-resolute-raccoon-released/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:48:55.000Z</news:publication_date>
      <news:title>Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/copperhelm-raises-7-million-for-agentic-cloud-security-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:31:09.000Z</news:publication_date>
      <news:title>Copperhelm Raises $7 Million for Agentic Cloud Security Platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:24:00.000Z</news:publication_date>
      <news:title>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/openai-gpt-5-5-cybersecurity-safeguards/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:03:44.000Z</news:publication_date>
      <news:title>OpenAI’s GPT-5.5 is out with expanded cybersecurity safeguards</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su7whd/kyber_ransomware_gang_toys_with_postquantum/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:39:56.000Z</news:publication_date>
      <news:title>Kyber ransomware gang toys with post-quantum encryption on Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su7ovk/cisa_the_uks_ncsc_and_global_partners_warn_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:27:39.000Z</news:publication_date>
      <news:title>CISA, the UK’s NCSC and global partners warn of Chinese state-linked covert cyber networks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su7iif/captcha_opening_when_site_opened_for_firstime/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:17:34.000Z</news:publication_date>
      <news:title>Captcha Opening when Site opened for Firstime</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/cisa/cybersecurity-agencies-flags-use-of-covert-networks-by-china-linked-actors-for-espionage-offensive-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:13:29.000Z</news:publication_date>
      <news:title>Cybersecurity agencies flags use of covert networks by China-linked actors for espionage, offensive operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/cato-traces-large-scale-modbus-tcp-activity-targeting-plcs-exposing-persistent-gaps-in-ot-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:03:56.000Z</news:publication_date>
      <news:title>Cato traces large-scale Modbus/TCP activity targeting PLCs, exposing persistent gaps in OT security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/dragos-dismisses-zionsiphon-narrative-says-code-flaws-and-weak-ics-logic-render-ot-malware-operationally-ineffective/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:59:42.000Z</news:publication_date>
      <news:title>Dragos dismisses ZionSiphon narrative, says code flaws and weak ICS logic render OT malware operationally ineffective</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su6z16/plc_cybersecurity_securing_industrial_control/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:47:27.000Z</news:publication_date>
      <news:title>PLC Cybersecurity — Securing Industrial Control Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/kaja-ciglic-microsoft-nation-state-cyber-programs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:30:29.000Z</news:publication_date>
      <news:title>AI is speeding up nation-state cyber programs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su6m12/firestarterbackdoor_cisa_und_ncsc_warnen_vor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:27:49.000Z</news:publication_date>
      <news:title>FIRESTARTER-Backdoor: CISA und NCSC warnen vor APT-Malware auf Cisco-Firewalls</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/android-privacy-policy-logging-research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T05:00:57.000Z</news:publication_date>
      <news:title>A study of 1,000 Android apps finds a privacy policy logging gap</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su5wy5/can_anyone_tell_me_the_test_cases_after_the_3rd/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:51:54.000Z</news:publication_date>
      <news:title>Can anyone tell me the test cases after the 3rd one in this tool?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1su5ugt/fast16_mystery_shadowbrokers_reference_reveals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:48:33.000Z</news:publication_date>
      <news:title>fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su5t04/high_school_junior_with_zero_experience_how_do_i/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:46:29.000Z</news:publication_date>
      <news:title>High school junior with zero experience — how do I start learning cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/2026-global-it-spending-forecast/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:30:12.000Z</news:publication_date>
      <news:title>IT spending to hit $6.31 trillion record, thanks to AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su5esk/sitewall_waf_function/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:26:51.000Z</news:publication_date>
      <news:title>Sitewall WAF function</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su57o5/vmware_setting_up_isolated_environment_but_need/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:17:02.000Z</news:publication_date>
      <news:title>VMWare - Setting up isolated environment but need to be able to connect to the internet?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/24/ai-in-ci-cd-engineering-teams/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:00:20.000Z</news:publication_date>
      <news:title>Where AI in CI/CD is working for engineering teams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1su3l2z/fixing_the_exploit_didnt_fix_the_system_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:59:39.000Z</news:publication_date>
      <news:title>Fixing the Exploit Didn’t Fix the System: An Exploration of Trust Boundaries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su3ama/claude_for_android_source_code/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:46:21.000Z</news:publication_date>
      <news:title>Claude for Android Source Code</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su394i/can_someone_tell_me_what_this_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:44:28.000Z</news:publication_date>
      <news:title>Can someone tell me what this Cybersecurity dataset is about? Is this data related to a Cobalt Strike malware incident?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1su2v59/the_mythos_breach_breakdown_no_zeroday_needed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:26:30.000Z</news:publication_date>
      <news:title>The Mythos "breach" breakdown — no zero-day needed, just a supply chain failure and a leaked URL convention. Here's the full attack chain.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1su2evy/why_purellm_ctfs_dont_work_a_hybrid_architecture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:05:37.000Z</news:publication_date>
      <news:title>Why Pure-LLM CTFs Don't Work: A Hybrid Architecture for AI Security Challenges</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32924</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/tropic-trooper-apt-takes-aim-home-routers-japanese-targets</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:00:00.000Z</news:publication_date>
      <news:title>Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/chinese-apt-abuses-cloud-tools-spy-mongolia</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:00:00.000Z</news:publication_date>
      <news:title>Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stzy3s/the_behavioral_shift_why_trusted_relationships/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:12:20.000Z</news:publication_date>
      <news:title>The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/rethinking-threat-intelligence-in-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:00:00.000Z</news:publication_date>
      <news:title>From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stywcz/mythos_and_traditional_appsec/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:25:46.000Z</news:publication_date>
      <news:title>Mythos and traditional AppSec</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sty77p/newly_deciphered_sabotage_malware_may_have/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:55:55.000Z</news:publication_date>
      <news:title>Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1stxtw3/bitwarden_cli_compromised_in_ongoing_checkmarx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:40:20.000Z</news:publication_date>
      <news:title>Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain ...</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1stxk5z/uk_biobank_health_data_of_500k_listed_for_sale_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:29:12.000Z</news:publication_date>
      <news:title>UK Biobank Health Data of 500K Listed for Sale in China</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stxa7g/what_are_the_minimum_security_policies_a_small/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:52.000Z</news:publication_date>
      <news:title>What are the minimum security policies a small team actually needs?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/vercel-attack-fallout-expands/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:05:51.000Z</news:publication_date>
      <news:title>Vercel attack fallout expands to more customers and third-party systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/fast16-malware-stuxnet-precursor-iran-nuclear-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:00:00.000Z</news:publication_date>
      <news:title>Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stwp88/are_security_workflows_shifting_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:54:41.000Z</news:publication_date>
      <news:title>Are security workflows shifting from detection-first to validation-first?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1stwiff/psa_awstorecloud_is_a_malicious_fake_claude_api/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:47:17.000Z</news:publication_date>
      <news:title>PSA: awstore.cloud is a MALICIOUS fake Claude API provider - warn your fellow devs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stwgaw/recent_college_graduate_with_a_bachelors_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:44:57.000Z</news:publication_date>
      <news:title>Recent College Graduate with a bachelors and masters in Computer Science. Looking for advise for what to do next when trying to get jobs, outside of certifications.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:33:45.000Z</news:publication_date>
      <news:title>Hackers exploit file upload bug in Breeze Cache WordPress plugin</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stvuy8/i_feel_bad_for_turning_down_an_ot_opportunity_can/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:22:07.000Z</news:publication_date>
      <news:title>I feel bad for turning down an OT opportunity, can you cheer me up?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stvskz/attempted_hack_on_my_microsoft_account_was_it_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:19:35.000Z</news:publication_date>
      <news:title>Attempted hack on my Microsoft account. Was it a VPN node?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/china-hackers-industrializing-botnets</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:52:24.000Z</news:publication_date>
      <news:title>China-Backed Hackers Are Industrializing Botnets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/frontier-ai-top-questions-answered/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:45:50.000Z</news:publication_date>
      <news:title>Frontier AI and the Future of Defense: Your Top Questions Answered</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/cisco-firestarter-malware-cisa-warning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:25:05.000Z</news:publication_date>
      <news:title>US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/us-sanctions-cambodian-senator-scam-compounds</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:07:00.000Z</news:publication_date>
      <news:title>US sanctions Cambodian senator for millions earned through scam compounds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sttosq/bitwarden_cli_npm_package_compromised_to_steal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:01:05.000Z</news:publication_date>
      <news:title>Bitwarden CLI npm package compromised to steal developer credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/dragos-zionsiphon-ai-malware-targeting-water-sector-hype/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:50:24.000Z</news:publication_date>
      <news:title>Dragos: Despite AI use, new malware targeting water plants is ‘hype’</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:21:01.000Z</news:publication_date>
      <news:title>Bitwarden CLI npm package compromised to steal developer credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-telecom-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:19:32.000Z</news:publication_date>
      <news:title>Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cisa-us-agency-breached-cisco-vulnerability-backdoor</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:03:00.000Z</news:publication_date>
      <news:title>CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:59:39.000Z</news:publication_date>
      <news:title>Trigona ransomware attacks use custom exfiltration tool to steal data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/surveillance-companies-exploiting-telecom-systems-to-track-location</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:43:00.000Z</news:publication_date>
      <news:title>Surveillance companies exploiting telecom system to spy on targets’ locations, research shows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1str4k9/cve202634621_adobe_acrobat_reader_zeroday_was_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:27:39.000Z</news:publication_date>
      <news:title>CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:16:00.000Z</news:publication_date>
      <news:title>UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stqivn/opportunity_to_pivot_from_technical_writing_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:06:32.000Z</news:publication_date>
      <news:title>Opportunity to pivot from Technical Writing to GRC AI Governance (with a bad catch)... Need advice!!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stq84j/realistic_entrepreneurship_paths_in_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:56:13.000Z</news:publication_date>
      <news:title>Realistic entrepreneurship paths in cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stppt3/anyone_pursuing_btech_cybersecurity_from_upsifs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:38:27.000Z</news:publication_date>
      <news:title>Anyone pursuing btech cybersecurity from upsifs lucknow? How's your experience till now?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sto6j0/final_interview_with_the_ciso_tomorrow_any_advice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:45:08.000Z</news:publication_date>
      <news:title>Final interview with the CISO tomorrow, any advice?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/google-gemini-over-cyber-specific/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:40:00.000Z</news:publication_date>
      <news:title>Google Favors General‑Purpose Gemini Models Over Cybersecurity‑Specific AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/5-steps-to-become-mythos-ready-ai-cybersecurity</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:18:00.000Z</news:publication_date>
      <news:title>Five steps to become Mythos ready</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/china-nexus-covert-networks-advisory/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:13:51.000Z</news:publication_date>
      <news:title>A dozen allied agencies say China is building covert hacker networks out of everyday routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:05:12.000Z</news:publication_date>
      <news:title>New Checkmarx supply-chain breach affects KICS analysis tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/china-linked-hackers-target-mongolian-gov-slack-discord</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:03:00.000Z</news:publication_date>
      <news:title>China-linked hackers targeted Mongolian government using Slack, Discord for covert communications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1stmva0/oauth_20_bcp_414_reuse_detection_in_practice_race/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:57:57.000Z</news:publication_date>
      <news:title>OAuth 2.0 BCP §4.14 reuse detection in practice — race vs theft disambiguation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/privacy/2026/04/how-cyberattacks-on-companies-affect-everyone</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:34:09.000Z</news:publication_date>
      <news:title>How cyberattacks on companies affect everyone</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/cloudsmith-raises-72-million-in-series-c-funding/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:03:59.000Z</news:publication_date>
      <news:title>Cloudsmith Raises $72 Million in Series C Funding</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/hexagonalrodent-north-korean-hackers-targeting-developers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:56:46.000Z</news:publication_date>
      <news:title>With AI’s help, North Korean hackers stumbled into a near-undetectable attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stl5h9/i_gave_some_experienced_grc_folks_a_few_ai_risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:56:33.000Z</news:publication_date>
      <news:title>I gave some experienced GRC folks a few AI risk scenarios. Most scored around 60 percent. Curious how you would answer these.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stl0fq/bitwarden_cli_compromised_in_ongoing_checkmarx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:51:29.000Z</news:publication_date>
      <news:title>Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stkh3x/pyscan_vulnerability_scanner_that_beats_industry/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:32:17.000Z</news:publication_date>
      <news:title>Pyscan: vulnerability scanner that beats industry standards like pip-audit, safety cli, etc.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/bad-memories-haunt-ai-agents</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:30:31.000Z</news:publication_date>
      <news:title>Bad Memories Still Haunt AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1stk7yh/budgiekit_gdi_malware_maker_for_educational/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:22:53.000Z</news:publication_date>
      <news:title>Budgiekit - gdi malware maker (for educational purporses only)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cosmetics-giant-rituals-discloses-data-breach-affecting-customers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:16:21.000Z</news:publication_date>
      <news:title>Cosmetics giant Rituals discloses data breach affecting customers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/france-hacker-arrested-data-breaches-sports-federations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:13:37.000Z</news:publication_date>
      <news:title>Hacker with a special interest in breaching sports institutions ends behind bars</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stjx22/stuck_in_tutorial_hell_i_know_the_theory_of_idor/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:11:44.000Z</news:publication_date>
      <news:title>Stuck in "Tutorial Hell": I know the theory of IDOR perfectly, but can't find anything in the wild. How do I bridge the gap?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stjwkc/cheaper_way_to_get_licences_for_jamf_crowdstrike/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:11:12.000Z</news:publication_date>
      <news:title>Cheaper way to get licences for Jamf, Crowdstrike and Okta for SMBs? Do you know resellers that would do it for cheaper?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stjvs9/microsoft_issues_emergency_update_for_macos_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:10:24.000Z</news:publication_date>
      <news:title>Microsoft issues emergency update for macOS and Linux ASP.NET threat</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/regular-password-resets-arent-as-safe-as-you-think/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:10:20.000Z</news:publication_date>
      <news:title>Regular Password Resets Aren’t as Safe as You Think</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cloud.google.com/blog/topics/threat-intelligence/unc6692-social-engineering-custom-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:00:00.000Z</news:publication_date>
      <news:title>Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stj6h2/cve_reassessment_platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:43:43.000Z</news:publication_date>
      <news:title>CVE reassessment platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:42:00.000Z</news:publication_date>
      <news:title>Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/trump-pick-to-lead-cisa-withdraws-from-consideration</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:35:00.000Z</news:publication_date>
      <news:title>Trump’s pick for CISA director withdraws from consideration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/house-republicans-unveil-data-privacy-law-override-state-measures</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:30:00.000Z</news:publication_date>
      <news:title>House Republicans unveil data privacy law that would override state protections</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-some-teams-users-cant-join-meetings-after-edge-update/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:18:10.000Z</news:publication_date>
      <news:title>Microsoft: Some Teams users can’t join meetings after Edge update</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:17:00.000Z</news:publication_date>
      <news:title>ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stigg7/vercel_breach_explained_shadow_ai_oauth_sprawl/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:14:51.000Z</news:publication_date>
      <news:title>Vercel Breach Explained: Shadow AI, OAuth sprawl, and why some security tools could miss it, from someone at a SaaS Security company.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stidkn/from_apt29_logs_to_real_detection_rules/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:11:43.000Z</news:publication_date>
      <news:title>From APT29 Logs to Real Detection Rules</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/medical-data-on-500000-britons-put-on-sale-alibaba</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:02:00.000Z</news:publication_date>
      <news:title>Medical data of 500,000 Britons put up for sale on Chinese website</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/ip-fabric-mcp-server/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:00:12.000Z</news:publication_date>
      <news:title>IP Fabric MCP server adds governance and control to enterprise AIOps workflows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/apple-ios-notification-bug-deleted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:00:00.000Z</news:publication_date>
      <news:title>Apple Fixes iOS Notification Bug Exposing Deleted Messages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/aqua-security-compass/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:48:19.000Z</news:publication_date>
      <news:title>Aqua Compass MCP server enables real-time investigation and containment of runtime threats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/chinese-cybersecurity-firms-ai-hacking-claims-draw-comparisons-to-claude-mythos/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:36:45.000Z</news:publication_date>
      <news:title>Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sthhx6/high_reverse_dns_queries/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:35:24.000Z</news:publication_date>
      <news:title>High Reverse DNS queries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sthfrn/ioc_block_in_cortex_xdr/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:32:49.000Z</news:publication_date>
      <news:title>IOC Block in Cortex XDR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/uk-warns-of-chinese-hackers-using-botnets-of-hijacked-consumer-devices-to-evade-detection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:28:39.000Z</news:publication_date>
      <news:title>UK warns of Chinese hackers using proxy networks to evade detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stgxij/virustotal_0_detections_but_sandbox_result_shows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:10:59.000Z</news:publication_date>
      <news:title>VirusTotal, 0 detections but sandbox result shows OS Credential Dumping = false positive or malware?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-gopherwhisper-apt-group-abuses-outlook-slack-discord-for-comms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:06:18.000Z</news:publication_date>
      <news:title>New GopherWhisper APT group abuses Outlook, Slack, Discord for comms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/webinar-mythos-reality-check-beating.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:03:00.000Z</news:publication_date>
      <news:title>[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/android-verified-email-credentials-feature/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:01:20.000Z</news:publication_date>
      <news:title>Google brings instant email verification to Android, no OTP needed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/23/cisa-adds-one-known-exploited-vulnerability-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds One Known Exploited Vulnerability to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/google-ai-agent-identities-gemini/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:00:00.000Z</news:publication_date>
      <news:title>Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/rilian-raises-17-5-million-for-ai-native-security-orchestration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:45:30.000Z</news:publication_date>
      <news:title>Rilian Raises $17.5 Million for AI-Native Security Orchestration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:30:00.000Z</news:publication_date>
      <news:title>Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stfx8e/sharepoint_phishing_advice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:24:13.000Z</news:publication_date>
      <news:title>SharePoint Phishing Advice</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/ncsc-silentglass-cybersecurity-tool-hdmi-displayport/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:16:41.000Z</news:publication_date>
      <news:title>If cyber espionage via HDMI worries you, NCSC built a device to stop it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/cve-2026-28950-iphone-vulnerability-notifications-signal/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:15:27.000Z</news:publication_date>
      <news:title>Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stfnys/built_a_small_network_monitoring_threat_detection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:11:37.000Z</news:publication_date>
      <news:title>built a small network monitoring + threat detection tool, looking for thoughts on where to take it next</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stfntk/zealot_shows_what_ais_capable_of_in_staged_cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:11:27.000Z</news:publication_date>
      <news:title>'Zealot' Shows What AI's Capable of in Staged Cloud Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/the-behavioral-shift-why-trusted-relationships-are-the-newest-attack-surface/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:06:44.000Z</news:publication_date>
      <news:title>The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:05:57.000Z</news:publication_date>
      <news:title>CISA orders feds to patch BlueHammer flaw exploited as zero-day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/luxury-cosmetics-giant-rituals-discloses-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:04:51.000Z</news:publication_date>
      <news:title>Luxury Cosmetics Giant Rituals Discloses Data Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stfeea/uk_security_agency_officially_declares_passkeys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:58:05.000Z</news:publication_date>
      <news:title>UK security agency officially declares passkeys superior to passwords – and passkeys should be the 'first choice' for authentication</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stf8d3/apple_fixes_bug_that_let_the_fbi_recover_deleted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:49:20.000Z</news:publication_date>
      <news:title>Apple fixes bug that let the FBI recover deleted Signal messages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stexyj/how_can_anyone_trust_an_identity_theft_protection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:33:51.000Z</news:publication_date>
      <news:title>How can anyone trust an identity theft protection service?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/cyberattacks-surge-63-annually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:30:00.000Z</news:publication_date>
      <news:title>Cyber-Attacks Surge 63% Annually in Education Sector</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://ics-cert.kaspersky.com/publications/reports/2026/04/23/threat-landscape-for-industrial-automation-systems-russia-q4-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:30:00.000Z</news:publication_date>
      <news:title>Threat landscape for industrial automation systems. Russia, Q4 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/apple-fixes-ios-bug-that-kept-deleted-notifications-including-chat-previews</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:27:32.000Z</news:publication_date>
      <news:title>Apple fixes iOS bug that kept deleted notifications, including chat previews</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32922</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:18:30.000Z</news:publication_date>
      <news:title>Apple Patches Exploited Notification Flaw, (Thu, Apr 23rd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/regulation-standards-and-compliance/enisa-updates-ncaf-2-0-to-help-governments-measure-and-close-cybersecurity-gaps-push-cyber-maturity-benchmarking/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:16:10.000Z</news:publication_date>
      <news:title>ENISA updates NCAF 2.0 to help governments measure and close cybersecurity gaps, push cyber maturity benchmarking</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stelbg/dutch_databreach_season_continues_as_rituals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:14:51.000Z</news:publication_date>
      <news:title>Dutch data-breach season continues as Rituals confirms a breach of its loyalty program (41M members across 33+ countries). Exact count not disclosed. Stolen: names, dates of birth, gender, addresses, email, phone nr, store &amp; account types.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/regulation-standards-and-compliance/uk-ncsc-details-cross-domain-model-to-secure-data-flows-across-trust-boundaries-prescribes-six-design-principles/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:13:51.000Z</news:publication_date>
      <news:title>UK NCSC details cross domain model to secure data flows across trust boundaries, prescribes six design principles</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/ai-can-autonomously-hack-cloud-systems-with-minimal-oversight-researchers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:09:40.000Z</news:publication_date>
      <news:title>AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/threat-landscape/anthropics-mythos-signals-new-era-of-autonomous-cyber-threats-raising-stakes-for-ai-governance-and-cyber-resilience/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:08:23.000Z</news:publication_date>
      <news:title>Anthropic’s Mythos signals new era of autonomous cyber threats, raising stakes for AI governance and cyber resilience</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1steh1u/the_news_about_an_ai_finding_decadeold/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:08:12.000Z</news:publication_date>
      <news:title>The news about an AI finding decade-old vulnerabilities across every major OS made me think differently about our supply chain program</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/autonomous-ai-cloud-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:00:31.000Z</news:publication_date>
      <news:title>Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/zealot-shows-ai-execute-full-cloud-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:00:00.000Z</news:publication_date>
      <news:title>'Zealot' Shows What AI's Capable of in Staged Cloud Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ste3qp/please_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:47:12.000Z</news:publication_date>
      <news:title>Please help</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ste193/need_opinions_on_grc_for_operational_technology/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:43:16.000Z</news:publication_date>
      <news:title>Need opinions on GRC for Operational Technology (OT)/plant level systems from the experts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/researchers-10-wild-indirect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:30:00.000Z</news:publication_date>
      <news:title>Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stdoef/a_selfpropagating_npm_worm_is_actively_spreading/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:21:30.000Z</news:publication_date>
      <news:title>A Self-Propagating npm Worm Is Actively Spreading Through Developer Environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:04:00.000Z</news:publication_date>
      <news:title>China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/gopherwhisper-apt-group/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:00:10.000Z</news:publication_date>
      <news:title>GopherWhisper APT group hides command and control traffic in Slack and Discord</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.welivesecurity.com/en/eset-research/gopherwhisper-burrow-full-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:59:18.000Z</news:publication_date>
      <news:title>GopherWhisper: A burrow full of malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/apple-patches-ios-flaw-allowing-recovery-of-deleted-chats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:50:19.000Z</news:publication_date>
      <news:title>Apple Patches iOS Flaw Allowing Recovery of Deleted Chats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/ncsc-backs-passkeys-new-era-of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:45:00.000Z</news:publication_date>
      <news:title>NCSC Backs Passkeys, Hailing a New Era of Sign-in</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/openai-privacy-filter-personally-identifiable-information/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:42:44.000Z</news:publication_date>
      <news:title>OpenAI tackles a bad habit people have when interacting with AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/vercel-finds-more-compromised-accounts.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:40:00.000Z</news:publication_date>
      <news:title>Vercel Finds More Compromised Accounts in Context.ai-Linked Breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stcz8e/ccdl1_vs_btl1_vs_psaa_which_certificate_out_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:39:43.000Z</news:publication_date>
      <news:title>CCDL1 vs BTL1 vs PSAA - Which certificate out of these 3 provides the most quality learning? All opinions and insights are appreciated!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/apple-patches-ios-flaw-that-stored.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:06:00.000Z</news:publication_date>
      <news:title>Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/recent-microsoft-defender-vulnerability-exploited-as-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:00:36.000Z</news:publication_date>
      <news:title>Recent Microsoft Defender Vulnerability Exploited as Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/roblox-clamps-down-on-chats-and-age-checks-as-legal-pressure-builds</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:57:37.000Z</news:publication_date>
      <news:title>Roblox clamps down on chats and age checks as legal pressure builds</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stbw1m/any_chance_something_happened/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:34:35.000Z</news:publication_date>
      <news:title>Any Chance Something Happened?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stbu1t/agent_memory_protector_free_poc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:31:08.000Z</news:publication_date>
      <news:title>Agent memory protector free Poc</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stbm6e/are_security_compliance_demands_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:18:19.000Z</news:publication_date>
      <news:title>Are security &amp; compliance demands actually increasing, or just getting more visibility?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/african-organizations-see-easing-of-cyberattacks</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:01:00.000Z</news:publication_date>
      <news:title>Africa Relinquishes Cyberattack Lead to Latin America — For Now</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1stanq5/llm_security_automation_isnt_a_dropin_scanner_yet/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T06:23:15.000Z</news:publication_date>
      <news:title>LLM Security Automation Isn’t a Drop-In Scanner Yet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stanad/third_blackcat_insider_pleads_guilty_as_doj/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T06:22:36.000Z</news:publication_date>
      <news:title>Third BlackCat Insider Pleads Guilty as DOJ Signals Crackdown on Ransomware Response Firms</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1stacwc/firefox_v_150_three_of_271_vulnerabilities_fixed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T06:06:45.000Z</news:publication_date>
      <news:title>Firefox v. 150. Three of 271 vulnerabilities fixed?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/sandra-mcleod-zoom-ciso-leadership/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T05:30:34.000Z</news:publication_date>
      <news:title>A year in, Zoom’s CISO reflects on balancing security and business</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/scenario-open-source-framework-for-automated-ai-app-red-teaming/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T05:00:54.000Z</news:publication_date>
      <news:title>Scenario: Open-source framework for automated AI app red-teaming</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/gdpr-enforcement-measurement-study/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T04:30:03.000Z</news:publication_date>
      <news:title>GDPR works, but only where someone enforces it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1st7xly/show_hn_dead_dialect_malware_speaks_dead_language/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T04:01:30.000Z</news:publication_date>
      <news:title>Show HN: Dead Dialect — Malware speaks dead language, cannot execute in session</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/23/cyber-insurance-claims-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T04:00:36.000Z</news:publication_date>
      <news:title>Ransomware, fraud, and lawsuits drive cyber insurance claims to new peaks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st6yz3/cibc_bank_impersonation_and_phishing_scam/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:15:26.000Z</news:publication_date>
      <news:title>Cibc bank impersonation and phishing scam 1-888-274-5552</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32920</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T02:00:03.000Z</news:publication_date>
      <news:title>ISC Stormcast For Thursday, April 23rd, 2026 https://isc.sans.edu/podcastdetail/9904, (Thu, Apr 23rd)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1st49g3/malware_to_data_breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T01:13:03.000Z</news:publication_date>
      <news:title>Malware to Data Breach.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st3q65/tool_recommendations_for_vulncve_research/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:49:00.000Z</news:publication_date>
      <news:title>Tool recommendations for vuln/CVE research</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st3iql/t0xique_password_story/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:39:31.000Z</news:publication_date>
      <news:title>T0XIQUE PASSWORD STORY</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1st2wrg/reversing_the_gentlemen_ransomware_gogarble/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:12:16.000Z</news:publication_date>
      <news:title>Reversing The Gentlemen ransomware (Go/Garble) — ephemeral X25519 keys persist in go routine stacks, enabling full decryption.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/research/critical-minerals-and-cyber-operations</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:00:00.000Z</news:publication_date>
      <news:title>Critical minerals and cyber operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.recordedfuture.com/blog/trust-is-a-superpower</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:00:00.000Z</news:publication_date>
      <news:title>Today, trust is the superpower that makes innovation possible</news:title>
    </news:news>
  </url>
</urlset>