<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T22:03:01.000Z</news:publication_date>
      <news:title>Hackers exploit critical flaw in Ninja Forms WordPress plugin</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/bypass-of-aws-sandbox-network-isolation-mode/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T22:00:11.000Z</news:publication_date>
      <news:title>Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:41:52.000Z</news:publication_date>
      <news:title>FBI: Americans lost a record $21 billion to cybercrime last year</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf7sno/cve202634197_activemq_rce_via_jolokia_api/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:31:22.000Z</news:publication_date>
      <news:title>CVE-2026-34197: ActiveMQ RCE via Jolokia API</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf7q11/assessing_claude_mythos_previews_capabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:28:44.000Z</news:publication_date>
      <news:title>Assessing Claude Mythos Preview’s capabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fbi-pentagon-warn-iran-hacking-groups-target-ot</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:26:00.000Z</news:publication_date>
      <news:title>FBI, Pentagon warn of Iran hacking groups targeting operational technology</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/storm-1175-medusa-ransomware-high-velocity</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:15:07.000Z</news:publication_date>
      <news:title>Storm-1175 Deploys Medusa Ransomware at 'High Velocity'</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:13:51.000Z</news:publication_date>
      <news:title>Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/grafana-patches-ai-bug-leaked-user-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:52:26.000Z</news:publication_date>
      <news:title>Grafana Patches AI Bug That Could Have Leaked User Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf6qtt/where_ai_meets_server_assault/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:52:12.000Z</news:publication_date>
      <news:title>Where AI meets server assault</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf6iup/beyond_burnt_out_unsure_where_to_turn/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:44:03.000Z</news:publication_date>
      <news:title>Beyond burnt out, unsure where to turn.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:39:18.000Z</news:publication_date>
      <news:title>Snowflake customers hit in data theft attacks after SaaS integrator breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf5tvm/free_cti_fusion_playbook/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:18:55.000Z</news:publication_date>
      <news:title>Free CTI Fusion Playbook</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf5fbb/mythos_has_been_launched/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:04:26.000Z</news:publication_date>
      <news:title>Mythos has been launched!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf5968/want_to_be_a_pentester_let_me_tell_you_how_actual/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:58:34.000Z</news:publication_date>
      <news:title>Want to be a pentester? Let me tell you how! (Actual pentester)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf550g/the_race_to_ship_ai_tools_left_security_behind/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:54:28.000Z</news:publication_date>
      <news:title>The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/online-crime-financial-losses-fbi-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:53:17.000Z</news:publication_date>
      <news:title>Cybercrime losses break the $20 billion mark</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/anthropic-mythos-preview-project-glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:49:50.000Z</news:publication_date>
      <news:title>Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4w9j/anthropic_announces_new_initiative_project/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:45:38.000Z</news:publication_date>
      <news:title>Anthropic announces new initiative, Project Glasswing, with tech + security partners and Claude Mythos Preview model to secure critical software</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:39:56.000Z</news:publication_date>
      <news:title>Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4p1c/german_authorities_identify_revil_and_gandcrab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:38:22.000Z</news:publication_date>
      <news:title>German authorities identify REvil and GandCrab ransomware bosses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4mzs/iranianaffiliated_cyber_actors_exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:36:16.000Z</news:publication_date>
      <news:title>Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf4m5v/what_information_about_a_cve_do_you_pay_attention/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:35:28.000Z</news:publication_date>
      <news:title>What information about a CVE do you pay attention to and why?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32874</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:28:16.000Z</news:publication_date>
      <news:title>A Little Bit Pivoting: What Web Shells are Attackers Looking for&amp;#x3f;, (Tue, Apr 7th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf3qun/tech_giants_launch_aipowered_project_glasswing_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:05:06.000Z</news:publication_date>
      <news:title>Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:02:26.000Z</news:publication_date>
      <news:title>US warns of Iranian hackers targeting critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/project-glasswing-anthropic-ai-open-source-software-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:00:00.000Z</news:publication_date>
      <news:title>Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/iranian-hackers-cyberattacks-us-energy-water-infrastructure-plc-scada-warning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:58:47.000Z</news:publication_date>
      <news:title>Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sf39zm/anthropic_opus_46_is_less_good_at_finding_vulns/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:48:55.000Z</news:publication_date>
      <news:title>Anthropic Opus 4.6 is less good at finding vulns than you might think</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:02:44.000Z</news:publication_date>
      <news:title>Russia Hacked Routers to Steal Microsoft Office Tokens</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:02:05.000Z</news:publication_date>
      <news:title>Max severity Flowise RCE vulnerability now exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/russian-state-linked-apt28-exploits.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:48:00.000Z</news:publication_date>
      <news:title>Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fbi-internet-crime-complaint-center-annual-cybercrime-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:47:46.000Z</news:publication_date>
      <news:title>Cybercrime losses jumped 26% to $20.9 billion in 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/the-new-rules-of-engagement-matching-agentic-attack-speed/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:40:52.000Z</news:publication_date>
      <news:title>The New Rules of Engagement: Matching Agentic Attack Speed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf16o3/sandbox_app_like_anyrun_but_not_anyrun/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:36:59.000Z</news:publication_date>
      <news:title>sandbox app like "any.run" but not any.run?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:34:26.000Z</news:publication_date>
      <news:title>Trent AI Emerges From Stealth With $13 Million in Funding</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/national-security-vets-warn-section-702-authorization-delay</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:29:00.000Z</news:publication_date>
      <news:title>National security veterans warn against delays in FISA 702 reauthorization</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/russian-hackers-router-hijacking-dns-credential-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:18:00.000Z</news:publication_date>
      <news:title>Russian hackers hijack internet traffic using vulnerable routers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf0mci/aspiring_grc_analyst/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:17:05.000Z</news:publication_date>
      <news:title>Aspiring GRC analyst</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sf04s0/i_built_a_recon_tool_that_turns_exposed_secrets/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:00:15.000Z</news:publication_date>
      <news:title>I built a recon tool that turns exposed secrets into real attack paths</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:52:00.000Z</news:publication_date>
      <news:title>Massachusetts hospital turning ambulances away after cyberattack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:51:22.000Z</news:publication_date>
      <news:title>Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sezrmc/javascript_runtime_instrumentation_via_chrome/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:47:25.000Z</news:publication_date>
      <news:title>JavaScript runtime instrumentation via Chrome DevTools Protocol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezqge/soc_practice/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:46:13.000Z</news:publication_date>
      <news:title>Soc practice</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezhpr/your_agent_remembers_your_secrets_and_keys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:37:25.000Z</news:publication_date>
      <news:title>Your agent remembers your secrets and keys</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/critical-flowise-vulnerability-in-attacker-crosshairs/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:34:51.000Z</news:publication_date>
      <news:title>Critical Flowise Vulnerability in Attacker Crosshairs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/ransomware/storm-1175-exploits-web-facing-systems-to-drive-ransomware-attacks-across-healthcare-and-services-in-us-uk-australia/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:33:01.000Z</news:publication_date>
      <news:title>Storm-1175 exploits web-facing systems to drive ransomware attacks across healthcare and services in US, UK, Australia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/malaysias-digital-growth-and-geopolitics-widen-cyber-attack-surface-raising-critical-infrastructure-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:22.000Z</news:publication_date>
      <news:title>Malaysia’s digital growth and geopolitics widen cyber attack surface, raising critical infrastructure risks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sezakj/soc_hand_on_project/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:18.000Z</news:publication_date>
      <news:title>Soc hand on project</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:00.000Z</news:publication_date>
      <news:title>Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/finite-state-appoints-ann-miller-to-scale-product-security-and-software-supply-chain-strategy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:28:26.000Z</news:publication_date>
      <news:title>Finite State appoints Ann Miller to scale product security and software supply chain strategy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:15:00.000Z</news:publication_date>
      <news:title>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/gpu-based-rowhammer-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:05:00.000Z</news:publication_date>
      <news:title>GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/07/qualys-cloud-security-forecast-2026-risk-trends-insights</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:00:00.000Z</news:publication_date>
      <news:title>Signals from the Cloud Security Forecast 2026: Cloud Risk Is Scaling through Design, Not Disruption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:57:16.000Z</news:publication_date>
      <news:title>RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexzs6/we_finally_built_a_vulnerability_prioritization/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:43:19.000Z</news:publication_date>
      <news:title>We finally built a vulnerability prioritization system and now the real problems are showing up!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:36:44.000Z</news:publication_date>
      <news:title>Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/lies-damned-lies-cybersecurity-metrics</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:26:02.000Z</news:publication_date>
      <news:title>Lies, Damned Lies, and Cybersecurity Metrics</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/severe-strongbox-vulnerability-patched-in-android/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:23:51.000Z</news:publication_date>
      <news:title>Severe StrongBox Vulnerability Patched in Android</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexcn2/how_do_you_work_with_downloads_from_untrusted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:19:43.000Z</news:publication_date>
      <news:title>How do you work with downloads from untrusted sources ? What are the safest practices to avoid malware and attacks?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sexaln/feature_updatespatch_mgmt/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:17:36.000Z</news:publication_date>
      <news:title>Feature updates/patch mgmt</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sewxk6/grafanaghost_bypasses_grafanas_ai_defenses/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:04:10.000Z</news:publication_date>
      <news:title>‘GrafanaGhost’ bypasses Grafana's AI defenses without leaving a trace</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/why-your-automated-pentesting-tool-just-hit-a-wall/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:01:11.000Z</news:publication_date>
      <news:title>Why Your Automated Pentesting Tool Just Hit a Wall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/uk-exposes-russian-cyber-unit-hacking-home-routers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>UK exposes Russian cyber unit hacking home routers to hijack internet traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:00:00.000Z</news:publication_date>
      <news:title>SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:58:45.000Z</news:publication_date>
      <news:title>GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/grafanaghost-grafana-prompt-injection-vulnerability-data-exfiltration/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:44:35.000Z</news:publication_date>
      <news:title>‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sewcwa/run_the_funnyappexe_and_youre_a_windows_admin_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:42:10.000Z</news:publication_date>
      <news:title>Run the FunnyApp.exe, and you’re a Windows admin. An unknown individual just dropped a zero-day exploit for elevating privileges on Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/acronis-mdr-by-acronis-tru/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:37:53.000Z</news:publication_date>
      <news:title>Acronis MDR by TRU brings 24/7 managed detection and response to MSPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/webinar-today-why-automated-pentesting-alone-is-not-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:19:29.000Z</news:publication_date>
      <news:title>Webinar Today: Why Automated Pentesting Alone Is Not Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/cloudflare-post-quantum-authentication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:35.000Z</news:publication_date>
      <news:title>Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cybersecurity-operations/focusing-people-cybersecurity-rsac2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:00.000Z</news:publication_date>
      <news:title>Focusing on the People in Cybersecurity at RSAC 2026 Conference</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sev5qf/are_group_interviews_a_scam/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:54:35.000Z</news:publication_date>
      <news:title>Are group interviews a scam?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:46:00.000Z</news:publication_date>
      <news:title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seumfv/your_ai_agent_has_more_access_than_your_employees/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:41.000Z</news:publication_date>
      <news:title>Your AI Agent Has More Access Than Your Employees</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/webinar-how-to-close-identity-gaps-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:17:00.000Z</news:publication_date>
      <news:title>[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cyberattack-hits-northern-ireland-schools</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:04:00.000Z</news:publication_date>
      <news:title>Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/17bn-lost-to-cyber-fraud-warns-fbi/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:00:00.000Z</news:publication_date>
      <news:title>Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/microsoft-device-code-phishing-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:57:49.000Z</news:publication_date>
      <news:title>AI-enabled device code phishing campaign exploits OAuth flow for account takeover</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/traffic-violation-scams-swap-links-for-qr-codes-to-steal-your-card-details</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:57:37.000Z</news:publication_date>
      <news:title>Traffic violation scams swap links for QR codes to steal your card details</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sett79/microsoft_speech_lateral_movement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:55:29.000Z</news:publication_date>
      <news:title>Microsoft Speech - Lateral Movement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1setrdw/microsoft_speech_lateral_movement/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:53:04.000Z</news:publication_date>
      <news:title>Microsoft Speech - Lateral Movement</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/gpubreach-root-shell-access-achieved-via-gpu-rowhammer-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:31:38.000Z</news:publication_date>
      <news:title>GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/the-hidden-cost-of-recurring-credential.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:30:00.000Z</news:publication_date>
      <news:title>The Hidden Cost of Recurring Credential Incidents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sesllm/flowise_ai_agent_builder_under_active_cvss_100/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:55:02.000Z</news:publication_date>
      <news:title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:52:33.000Z</news:publication_date>
      <news:title>Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/data-breaches/2026/04/support-platform-breach-exposes-hims-hers-customer-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:45:50.000Z</news:publication_date>
      <news:title>Support platform breach exposes Hims &amp;amp; Hers customer data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1ses0p6/need_some_help_to_grow/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:23:00.000Z</news:publication_date>
      <news:title>Need some help to grow</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/industrial-cyber-attacks/csis-flags-irans-shift-from-episodic-cyberattacks-to-sustained-campaign-against-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:18:55.000Z</news:publication_date>
      <news:title>CSIS flags Iran’s shift from episodic cyberattacks to sustained campaign against critical infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/news/microchip-secures-iec-62443-4-1-ml2-certification-as-regulatory-pressure-mounts-on-device-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:13:03.000Z</news:publication_date>
      <news:title>Microchip secures IEC 62443-4-1 ML2 certification as regulatory pressure mounts on device security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/storm1175-medusa-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:02:00.000Z</news:publication_date>
      <news:title>Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1serfuv/having_a_siem_does_not_mean_you_have_forensic/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:50:16.000Z</news:publication_date>
      <news:title>Having a SIEM Does Not Mean You Have Forensic Readiness</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1serejf/pqaudit_scan_your_codebase_for_quantumvulnerable/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:48:06.000Z</news:publication_date>
      <news:title>pqaudit - scan your codebase for quantum-vulnerable cryptography</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/github-copilot-rubber-duck-cross-model-review/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:27:06.000Z</news:publication_date>
      <news:title>GitHub Copilot CLI gets a second-opinion feature built on cross-model review</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:26:00.000Z</news:publication_date>
      <news:title>Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/german-police-unmask-revil-ransomware-leader/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:24:40.000Z</news:publication_date>
      <news:title>German Police Unmask REvil Ransomware Leader</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seqwbz/i_built_an_autonomous_4agent_cve_redteam_loop/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:17:25.000Z</news:publication_date>
      <news:title>I built an autonomous 4-agent CVE red-team loop that runs overnight on an Android phone — no cloud, no GPU, BLAKE3-verified logs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/comp-ai-open-source-compliance-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:45:44.000Z</news:publication_date>
      <news:title>Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/openai-safety-fellowship-applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:39:52.000Z</news:publication_date>
      <news:title>OpenAI opens applications for an external AI safety research fellowship</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/new-gpubreach-attack-enables-full-cpu.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:38:00.000Z</news:publication_date>
      <news:title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seq5mg/chipsoft_website_is_offline/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:31:29.000Z</news:publication_date>
      <news:title>Chipsoft website is offline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/white-house-seeks-to-slash-cisa-funding-by-707-million/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:29:41.000Z</news:publication_date>
      <news:title>White House Seeks to Slash CISA Funding by $707 Million</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sep4hy/detecting_cicd_supply_chain_attacks_with_canary/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:27:50.000Z</news:publication_date>
      <news:title>Detecting CI/CD Supply Chain Attacks with Canary Credentials</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:35:00.000Z</news:publication_date>
      <news:title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:05:54.000Z</news:publication_date>
      <news:title>Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:56:00.000Z</news:publication_date>
      <news:title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1senj1s/결제_도용fraud_시도로_인한_트래픽_폭주_및_인프라_가용성_보호_전략/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:54:45.000Z</news:publication_date>
      <news:title>결제 도용(Fraud) 시도로 인한 트래픽 폭주 및 인프라 가용성 보호 전략</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1semz63/another_cryptominer_undected_by_windows_defender/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:23:57.000Z</news:publication_date>
      <news:title>Another cryptominer - undected by Windows Defender / ESET NOD32 and Malwarebytes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1semk5r/prompt_injection_detection/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:01:36.000Z</news:publication_date>
      <news:title>Prompt Injection Detection?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/alec-summers-mitre-cwe-vulnerability-mapping/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:00:51.000Z</news:publication_date>
      <news:title>The case for fixing CWE weakness patterns instead of patching one bug at a time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/crowdstrike-founding-member-anthropic-mythos-frontier-model-to-secure-ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:00:00.000Z</news:publication_date>
      <news:title>Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/mimecast-api-email-security-protection-video/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:30:18.000Z</news:publication_date>
      <news:title>How Mimecast brings enterprise-grade email protection to API deployment</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1selt3a/metatron_ai_penetration_testing_assistant_open/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:22:28.000Z</news:publication_date>
      <news:title>Metatron -AI PENETRATION TESTING ASSISTANT (open source)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sellln/i_was_targeted_by_a_fake_job_interview_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:12:05.000Z</news:publication_date>
      <news:title>I was targeted by a fake job interview on Wellfound. Instead of becoming a victim I reverse-engineered the malware. Here's the full analysis: 571 encrypted config values decrypted, C2 and Sentry DSN exposed, DPRK/Contagious Interview attribution.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/07/google-llm-content-moderation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:00:57.000Z</news:publication_date>
      <news:title>Google study finds LLMs are embedded at every stage of abuse detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sejkxy/orewatch_opensource_malicious_package_scanner/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:37:34.000Z</news:publication_date>
      <news:title>OreWatch – open-source malicious package scanner across 6 ecosystems, now with an MCP server so your AI coding agent stops installing malware.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sej7hc/deepzero_an_automated_agentic_vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:20:41.000Z</news:publication_date>
      <news:title>DeepZero: An automated, agentic vulnerability research pipeline for finding kernel zero-days</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sej48f/deepzero_an_automated_llmghidra_pipeline_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:16:40.000Z</news:publication_date>
      <news:title>DeepZero: An automated LLM/Ghidra pipeline for finding BYOVD zero-days in Windows drivers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32872</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seimh0/schedule_reporting_use_cases_in_opencti/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T01:54:41.000Z</news:publication_date>
      <news:title>Schedule reporting use cases in OpenCTI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seifit/recurring_failure_patterns_when_testing_llmbacked/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T01:46:08.000Z</news:publication_date>
      <news:title>Recurring failure patterns when testing LLM-backed APIs from a security perspective</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1segtd7/discover_the_top_25_cybersecurity_companies_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T00:35:59.000Z</news:publication_date>
      <news:title>Discover the top 25 cybersecurity companies in the U.S. that are leading the fight against cyber threats.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:54:04.000Z</news:publication_date>
      <news:title>German authorities identify REvil and GangCrab ransomware bosses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sefbus/this_video_demonstrates_a_reproducible_googleside/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:32:50.000Z</news:publication_date>
      <news:title>This video demonstrates a reproducible Google‑side issue where the system restores data that the user has deleted. The behavior happens in real time. It is not a cache problem, not a UI refresh glitch, and not user error</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1seenqt/fbi_ic3_report_finding_sim_swap_attacks_surging/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:05:14.000Z</news:publication_date>
      <news:title>FBI IC3 report- Finding: Sim swap attacks surging</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/rostelecom-cyberattack-disrupts-russian-internet-access</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:00:00.000Z</news:publication_date>
      <news:title>Cyberattack on telecom giant Rostelecom disrupts internet services across Russia</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1see9fk/hackathon/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:49:15.000Z</news:publication_date>
      <news:title>Hack-a-Thon</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sede4m/disgruntled_researcher_leaks_bluehammer_windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:14:42.000Z</news:publication_date>
      <news:title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/modern-kubernetes-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:00:08.000Z</news:publication_date>
      <news:title>Understanding Current Threats to Kubernetes Environments</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:44:15.000Z</news:publication_date>
      <news:title>New GPUBreach attack enables system takeover via GPU rowhammer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/ai-assisted-supply-chain-attack-targets-github</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:38:53.000Z</news:publication_date>
      <news:title>AI-Assisted Supply Chain Attack Targets GitHub</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:12:01.000Z</news:publication_date>
      <news:title>Fortinet customers confront actively exploited zero-day, with a full patch still pending</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/threat-intelligence/axios-attack-complex-social-engineering-industrialized</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:55:44.000Z</news:publication_date>
      <news:title>Axios Attack Shows Social Complex Engineering Is Industrialized</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/vulnerabilities-threats/fortinet-emergency-patch-forticlient-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:24:19.000Z</news:publication_date>
      <news:title>Fortinet Issues Emergency Patch for FortiClient Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/cyber-fraud-surges-to-17-billion-fbi-ic3</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:24:00.000Z</news:publication_date>
      <news:title>FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sea5v2/is_it_realistic_to_make_consistent_income_from/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:14:10.000Z</news:publication_date>
      <news:title>Is it realistic to make consistent income from bug bounty programs?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/medusa-ransomware-group-zero-days-microsoft</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:08:00.000Z</news:publication_date>
      <news:title>Medusa ransomware group using zero-days to launch attacks within 24 hours of breach, Microsoft says</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://blog.qualys.com/qualys-insights/2026/04/06/why-every-enterprise-needs-a-risk-operations-center-roc</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:00:57.000Z</news:publication_date>
      <news:title>Why Every Enterprise Needs a Risk Operations Center (ROC)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/big-tech-vows-to-continue-csam-scanning</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:20:00.000Z</news:publication_date>
      <news:title>Big tech vows to continue CSAM scanning in Europe despite expiration of law allowing it</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:27.000Z</news:publication_date>
      <news:title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:24.000Z</news:publication_date>
      <news:title>Microsoft fixes Classic Outlook bug causing email delivery issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se8l4f/free_owasp_top_10_for_llm_applications_exercises/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:19:10.000Z</news:publication_date>
      <news:title>Free OWASP Top 10 for LLM Applications exercises for AI security training. Fully white-labeled for your teaching / learning needs, no strings attached</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se8h0q/responsible_disclosure_is_structurally_dead_not/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:15:31.000Z</news:publication_date>
      <news:title>Responsible disclosure is structurally dead — not dying. Here's the analysis and what replaces it.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se7qle/the_fccs_recent_ban_on_new_foreignmade_consumer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:50:08.000Z</news:publication_date>
      <news:title>The FCC’s recent ban on new foreign-made consumer routers may not have an immediate impact for consumers, but one cybersecurity expert says it could have long-term consequences.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/iran-linked-password-spraying-campaign.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:37:00.000Z</news:publication_date>
      <news:title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/german-police-unmask-suspects-linked-revil-gandcrab</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:34:00.000Z</news:publication_date>
      <news:title>German police unmask two suspects linked to REvil ransomware gang</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/us-border-patrol-challenge-coins-nonprofits/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:16:27.000Z</news:publication_date>
      <news:title>Border Patrol Agents Sold Challenge Coins With ‘Charlotte’s Web’ Characters in Riot Gear</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se64xz/education_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:52:35.000Z</news:publication_date>
      <news:title>Education help</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/microsoft/microsoft-removes-support-and-recovery-assistant-from-windows/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:45:57.000Z</news:publication_date>
      <news:title>Microsoft removes Support and Recovery Assistant from Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se5x4i/fuse_powerful_wordlist_generator/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:45:09.000Z</news:publication_date>
      <news:title>Fuse: Powerful wordlist generator</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se5olb/what_does_your_daily_socmdr_work_look_like_3_yoe/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:36:58.000Z</news:publication_date>
      <news:title>“What does your daily SOC/MDR work look like? (3 YOE, looking to compare), ready to switch?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/stalkerware-maker-receives-no-jail-time</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:33:00.000Z</news:publication_date>
      <news:title>First stalkerware maker prosecuted since 2014 receives no jail time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se59v2/memory_only_recovery_account_system/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:22:45.000Z</news:publication_date>
      <news:title>Memory only recovery account system</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://cyberscoop.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:21:23.000Z</news:publication_date>
      <news:title>pcTattleTale stalkerware maker sentence includes fine, supervised release</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se4r27/cyber_secuiry_is_it_high_stress/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:04:09.000Z</news:publication_date>
      <news:title>Cyber secuiry is it high stress?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:56:01.000Z</news:publication_date>
      <news:title>Microsoft links Medusa ransomware affiliate to zero-day attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:35:03.000Z</news:publication_date>
      <news:title>Drift $280M crypto theft linked to 6-month in-person operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:34:17.000Z</news:publication_date>
      <news:title>Inside an AI‑enabled device code phishing campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1se3t0e/10_free_interactive_exercises_for_ai_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:30:05.000Z</news:publication_date>
      <news:title>10 free interactive exercises for AI security training. Fully white-labeled, no strings attached</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:24:00.000Z</news:publication_date>
      <news:title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/singapore-us-warn-of-fortinet-bug-exploited</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:20:00.000Z</news:publication_date>
      <news:title>Singapore, US warn of latest Fortinet bug being exploited in wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-fortinet-flaw-exploited-in-attacks-by-friday/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:02:14.000Z</news:publication_date>
      <news:title>CISA orders feds to patch exploited Fortinet EMS flaw by Friday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:00:00.000Z</news:publication_date>
      <news:title>Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se2hdg/how_do_you_think/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:42:36.000Z</news:publication_date>
      <news:title>How do you think ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/google-deepmind-researchers-map-web-attacks-against-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:32:54.000Z</news:publication_date>
      <news:title>Google DeepMind Researchers Map Web Attacks Against AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se27dc/research_we_scanned_3471_mcp_servers_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:32:41.000Z</news:publication_date>
      <news:title>[RESEARCH] We scanned 3,471 MCP servers for invisible Unicode — GPT-5.4 follows hidden instructions 100% of the time</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se263o/do_you_all_know_anybody_that_likes_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:23.000Z</news:publication_date>
      <news:title>Do you all know anybody that likes Microsoft Purview DLP?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyberattacks-data-breaches/automated-credential-harvesting-campaign-react2shell</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:09.000Z</news:publication_date>
      <news:title>Automated Credential Harvesting Campaign Exploits React2Shell Flaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se21el/web_filtering_test_sites/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:26:40.000Z</news:publication_date>
      <news:title>Web filtering test sites</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se1qs6/using_cloudflares_postquantum_tunnel_to_protect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:16:00.000Z</news:publication_date>
      <news:title>Using Cloudflare’s Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NAS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se1nc3/why_is_the_worlds_web_encryption_100_dependent_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:12:26.000Z</news:publication_date>
      <news:title>Why is the world’s web encryption 100% dependent on a single US-based non-profit?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0z5o/has_anyone_used_cardinalops_tidal_cyber_picus_or/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:48:10.000Z</news:publication_date>
      <news:title>Has anyone used CardinalOps, Tidal Cyber, Picus, or AttackIQ for detection gap analysis and did they actually solve the prioritization problem?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1se0u4e/trivy_supply_chain_attack_enabled_european/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:42:57.000Z</news:publication_date>
      <news:title>Trivy supply chain attack enabled European Commission cloud breach</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0n5h/passive_hid_monitor_that_scores_potentially/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:35:35.000Z</news:publication_date>
      <news:title>Passive HID monitor that scores potentially malicious keyboard-like USB devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1se0a4t/did_anyone_hear_about_this_linkedin_data_leak/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:21:54.000Z</news:publication_date>
      <news:title>Did anyone hear about this LinkedIn data leak?!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.tenable.com/blog/cve-2026-35616-fortinet-forticlientems-improper-access-control-vulnerability-exploited-in-the</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:21:05.000Z</news:publication_date>
      <news:title>CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/cyber-risk/shadow-ai-in-healthcare-is-here-to-stay</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:50.000Z</news:publication_date>
      <news:title>Shadow AI in Healthcare is Here to Stay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/why-simple-breach-monitoring-is-no-longer-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:02:12.000Z</news:publication_date>
      <news:title>Why Simple Breach Monitoring is No Longer Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdzev8/ai_empowered_vulnerability_scanner_tool_for_cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:49:53.000Z</news:publication_date>
      <news:title>AI Empowered Vulnerability scanner tool for cloud based application</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/application-security/owasp-genai-security-project-update-matrix</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:49:27.000Z</news:publication_date>
      <news:title>OWASP GenAI Security Project Gets Update, New Tools Matrix</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdylur/how_are_teams_thinking_about_security_for_llm/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:17:10.000Z</news:publication_date>
      <news:title>How are teams thinking about security for LLM agents right now?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdykyq/how_do_most_orgs_cope_with_selinux/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:16:08.000Z</news:publication_date>
      <news:title>How do most orgs cope with SELinux?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdye93/cracking_a_malvertising_dga_from_the_device_side/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:08:32.000Z</news:publication_date>
      <news:title>Cracking a Malvertising DGA From the Device Side</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdyd16/weblet_a_security_focused_cms/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:07:07.000Z</news:publication_date>
      <news:title>Weblet: A security focused CMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdy6s7/latest_interesting_cybersecurity_news_6th_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:00:07.000Z</news:publication_date>
      <news:title>Latest Interesting Cybersecurity News - 6th of April 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/multi-os-cyberattacks-how-socs-close.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:00:00.000Z</news:publication_date>
      <news:title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/weekly-recap-axios-hack-chrome-0-day.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:46:00.000Z</news:publication_date>
      <news:title>⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/threats-attacks/check-point-tracks-iranian-password-spraying-waves-targeting-government-and-energy-sectors-in-israel-and-uae/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:42:01.000Z</news:publication_date>
      <news:title>Check Point tracks Iranian password-spraying waves targeting government and energy sectors in Israel and UAE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/outage-hits-russian-banking-apps</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:37:00.000Z</news:publication_date>
      <news:title>Major outage hits Russian banking apps, metro payments across regions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/darktrace-finds-chinese-nexus-intrusions-reveal-dual-mode-tactics-targeting-critical-infrastructure-at-scale/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:36:58.000Z</news:publication_date>
      <news:title>Darktrace finds Chinese-nexus intrusions reveal dual-mode tactics targeting critical infrastructure at scale</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/hackers-threaten-to-leak-german-political-party-data</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:29:00.000Z</news:publication_date>
      <news:title>Hackers threaten to leak data after cyberattack on German party Die Linke</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/reports/sans-2026-report-flags-cybersecurity-skills-crisis-putting-critical-infrastructure-and-ot-sectors-at-measurable-breach-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:24:00.000Z</news:publication_date>
      <news:title>SANS 2026 report flags cybersecurity skills crisis, putting critical infrastructure and OT sectors at measurable breach risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdxbxj/closing_the_kernel_backport_gap_automated_cve/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:22:16.000Z</news:publication_date>
      <news:title>Closing the Kernel Backport Gap: Automated CVE Detection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdxafb/traffic_violation_scams_switch_to_qr_codes_in_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:20:20.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdwya8/axios_maintainers_post_mortem_confirms_social/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:04:48.000Z</news:publication_date>
      <news:title>Axios maintainer’s post mortem confirms social engineering by UNC1069</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:00:00.000Z</news:publication_date>
      <news:title>CISA Adds One Known Exploited Vulnerability to Catalog</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/how-litellm-turned-developer-machines.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:45:00.000Z</news:publication_date>
      <news:title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdwgyh/new_rowhammer_attacks_give_complete_control_of/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:42:40.000Z</news:publication_date>
      <news:title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/guardarian-users-targeted-with-malicious-strapi-npm-packages/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:40:56.000Z</news:publication_date>
      <news:title>Guardarian Users Targeted With Malicious Strapi NPM Packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:03:58.000Z</news:publication_date>
      <news:title>Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/north-korean-hackers-target-high-profile-node-js-maintainers/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:02:36.000Z</news:publication_date>
      <news:title>North Korean Hackers Target High-Profile Node.js Maintainers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdvk2q/controls_shape_attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:56:35.000Z</news:publication_date>
      <news:title>Controls Shape Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdv8dm/cracking_a_malvertising_dga_from_the_device_side/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:39:02.000Z</news:publication_date>
      <news:title>Cracking a Malvertising DGA From the Device Side</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/qilin-and-warlock-ransomware-use.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:07:00.000Z</news:publication_date>
      <news:title>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/fortinet-rushes-emergency-fixes-for-exploited-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:37:28.000Z</news:publication_date>
      <news:title>Fortinet Rushes Emergency Fixes for Exploited Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdtqh2/found_a_forgotten_public_s3_bucket_with_40k/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:11:19.000Z</news:publication_date>
      <news:title>Found a "forgotten" public S3 bucket with 40k+ customer KYC docs at my new gig</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdtqh2/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:11:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32870</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:50:27.000Z</news:publication_date>
      <news:title>How often are redirects used in phishing in 2026&amp;#x3f;, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdt12c/gave_everything_to_a_technical_assessment_only_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T08:27:33.000Z</news:publication_date>
      <news:title>Gave everything to a technical assessment only to get rejected because the position was already filled - how do you handle this?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sds2bv/is_oneman_ciso_role_worth_it/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:28:21.000Z</news:publication_date>
      <news:title>Is one-man CISO role worth it?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-march-30-april-5-2</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:01:00.000Z</news:publication_date>
      <news:title>A week in security (March 30 &amp;#8211; April 5)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:59:00.000Z</news:publication_date>
      <news:title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrh2y/htb_media_machine_walkthrough/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:53:13.000Z</news:publication_date>
      <news:title>HTB Media Machine Walkthrough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdrc73/interesting_leakixnet_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:44:51.000Z</news:publication_date>
      <news:title>Interesting leakix.net scanning</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdr9ip/built_a_tool_to_find_which_of_your_gcp_api_keys/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T06:40:26.000Z</news:publication_date>
      <news:title>Built a tool to find which of your GCP API keys now have Gemini access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/residential-proxy-attack-traffic-ip-reputation-enterprise-security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:30:05.000Z</news:publication_date>
      <news:title>Residential proxies make a mockery of IP-based defenses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/product-showcase-proton-authenticator-encrypted-open-source-2fa-app/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:00:39.000Z</news:publication_date>
      <news:title>Product showcase: Proton Authenticator is an end-to-end encrypted, open source 2FA app</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.crowdstrike.com/en-us/blog/how-crowdstrike-accelerates-exposure-evaluation-against-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:00:00.000Z</news:publication_date>
      <news:title>How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp8wh/고배당_특정_숫자_베팅에_쏠리는_데이터_패턴의_기술적_해석/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:46:00.000Z</news:publication_date>
      <news:title>고배당 특정 숫자 베팅에 쏠리는 데이터 패턴의 기술적 해석</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdp2zz/hidomgdetect_linux_driver_in_development_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:36:55.000Z</news:publication_date>
      <news:title>hid-omg-detect: Linux driver in development to detect malicious HID devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/enterprise-wireless-networks-security-exposure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:30:10.000Z</news:publication_date>
      <news:title>IT talent looks the other way as wireless security incidents pile up</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/06/rh-isac-enterprise-security-spending-report/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T04:00:36.000Z</news:publication_date>
      <news:title>CISOs grapple with AI demands within flat budgets</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdnuib/how_md5_hashing_works_and_does_it_actually_detect/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:33:40.000Z</news:publication_date>
      <news:title>How MD5 hashing works and does it actually detect file changes. and can you still trust it today?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdmipk/teampcp_used_trivy_to_breach_cisco_the_eu/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:30:33.000Z</news:publication_date>
      <news:title>TeamPCP used Trivy to breach Cisco, the EU Commission, and 1,000+ orgs—IOCs inside, April 3 deadline just passed with no statement from Cisco</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:07:17.000Z</news:publication_date>
      <news:title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://isc.sans.edu/diary/rss/32868</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:00:02.000Z</news:publication_date>
      <news:title>ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sdlisb/the_attack_with_no_attacker_domain_microsoft/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T01:45:04.000Z</news:publication_date>
      <news:title>The Attack With No Attacker Domain: Microsoft Entra B2B Guest Invitation Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdjzyp/bi_developer_here_should_i_pivot_to_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:35:55.000Z</news:publication_date>
      <news:title>BI Developer here… should I pivot to AI, cybersecurity, or something else?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdj7y0/mentorship_monday_post_all_career_education_and/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:30.000Z</news:publication_date>
      <news:title>Mentorship Monday - Post All Career, Education and Job questions here!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52491</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Grafana 11.6.0 - SSRF</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52490</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Zhiyuan OA - arbitrary file upload leading</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52489</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] WBCE CMS 1.6.4 - Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52488</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52487</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] WordPress  Madara - Local File Inclusion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52496</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] is-localhost-ip 2.0.0 - SSRF</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52495</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52494</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] Windows Kernel - Elevation of Privilege</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52493</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.exploit-db.com/exploits/52492</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T00:00:00.000Z</news:publication_date>
      <news:title>[webapps] ASP.net  8.0.10 - Bypass</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdi3vt/why_isnt_pgp_used_more_often_with_email_security/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T23:11:31.000Z</news:publication_date>
      <news:title>Why isn't PGP used more often with email security?</news:title>
    </news:news>
  </url>
</urlset>