<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:45:17.000Z</news:publication_date>
      <news:title>New FortiClient EMS flaw exploited in attacks, emergency patch released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdas5w/linux_70rc7_adding_more_documentation_for_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:15:44.000Z</news:publication_date>
      <news:title>Linux 7.0-rc7 adding more documentation for AI tools to send better security bug reports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sda9ce/a_deeper_look_at_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:55:41.000Z</news:publication_date>
      <news:title>A Deeper Look at RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sda8qp/reverse_engineering_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:54:59.000Z</news:publication_date>
      <news:title>Reverse Engineering RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd9uaa/quieres_aprender_a_cazar_amenazas_en_la_dark_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:39:31.000Z</news:publication_date>
      <news:title>🔥 ¿Quieres aprender a cazar amenazas en la Dark Web? La próxima semana iniciamos el curso de Dark Cyber Threat Intelligence. Te llevamos de lo básico a lo avanzado: investigación en foros oscuros, análisis de malware underground y mucho más. 👉 Obtén un 60% de descuento usando el cupón WILLIE60</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8mc1/cyber_awareness_jeff_3d_figure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:51:57.000Z</news:publication_date>
      <news:title>Cyber Awareness Jeff 3D Figure!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8a5e/is_ai_making_cybersecurity_stronger_or_just/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:38:35.000Z</news:publication_date>
      <news:title>Is AI making cybersecurity stronger or just supercharging hackers too?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd7rtm/anthropic_ran_an_ai_bug_bounty_on_open_source_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:18:37.000Z</news:publication_date>
      <news:title>Anthropic ran an AI bug bounty on open source for a month. It found 500+ zero-days.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd7hzh/gddrhammer_and_geforge_gddr6_gpu_rowhammer_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:08:04.000Z</news:publication_date>
      <news:title>GDDRHammer and GeForge: GDDR6 GPU Rowhammer to root shell (IEEE S&amp;P 2026, exploit code available)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd720i/is_cybersecurity_still_at_its_core_a_human_problem/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:41.000Z</news:publication_date>
      <news:title>Is cybersecurity still, at its core, a human problem?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd71k6/your_email_gateway_has_a_blind_spot_apts_already/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:11.000Z</news:publication_date>
      <news:title>Your Email Gateway Has a Blind Spot. APTs Already Know About It.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd6is7/syd_doing_a_full_exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:29:14.000Z</news:publication_date>
      <news:title>syd doing a full exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-react2shell-in-automated-credential-theft-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T14:17:23.000Z</news:publication_date>
      <news:title>Hackers exploit React2Shell in automated credential theft campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd30zy/certified_network_security_practitioner_cnsp/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T13:00:30.000Z</news:publication_date>
      <news:title>Certified Network Security Practitioner (CNSP) Study Materials?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd2vtq/anyone_interested_in_offline_ctf_event_in_india/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:53:30.000Z</news:publication_date>
      <news:title>Anyone interested in Offline ctf event in india ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1wh3/built_a_tool_to_stop_the_pain_of_manual_evtx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:04:57.000Z</news:publication_date>
      <news:title>Built a tool to stop the pain of manual EVTX triage</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1cgd/can_you_guys_me_suggestions_should_i_do_bca_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:34:43.000Z</news:publication_date>
      <news:title>Can you guys me suggestions, should i do BCA in Cyber Security or something else to get into CS field ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0tzy/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:05:25.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0qbj/deployed_goadlight_on_virtualbox_ubuntu_2404/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:57.000Z</news:publication_date>
      <news:title>Deployed GOAD-Light on VirtualBox (Ubuntu 24.04) - sharing my guide with the real errors I hit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd0q71/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:45.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0nzk/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:56:03.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0667/soc_analyst_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:25:46.000Z</news:publication_date>
      <news:title>SOC Analyst 1</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:00:00.000Z</news:publication_date>
      <news:title>The Hack That Exposed Syria’s Sweeping Security Failures</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scyj3y/feeling_stuck_and_looking_for_honest_advice_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:41:38.000Z</news:publication_date>
      <news:title>feeling stuck and looking for honest advice on whats next</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scy246/about_to_take_ejpt_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:11:26.000Z</news:publication_date>
      <news:title>About to take eJPT. help..</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scxx6w/cyber_crimes_attempt_preperation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:02:50.000Z</news:publication_date>
      <news:title>Cyber crimes &amp; attempt - preperation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:00:49.000Z</news:publication_date>
      <news:title>Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1scx6s9/database_of_malicious_chromeedge_extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:17:46.000Z</news:publication_date>
      <news:title>Database of malicious Chrome/Edge extensions - auto-updated daily</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/rising-breach-costs-and-operational-downtime-redefine-economics-of-ot-cybersecurity-making-it-boardroom-priority/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:55:32.000Z</news:publication_date>
      <news:title>Rising breach costs and operational downtime redefine economics of OT cybersecurity making it boardroom priority</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwnd9/the_visible_key_a_new_way_to_verify_source/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:45:42.000Z</news:publication_date>
      <news:title>The Visible Key — A New Way to Verify Source</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwfwe/are_companies_pushing_the_good_guys_to_go_rogue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:33:08.000Z</news:publication_date>
      <news:title>Are companies pushing the good guys to go rogue?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T05:07:00.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T04:32:00.000Z</news:publication_date>
      <news:title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct8hp/do_you_guys_think_risk_based_alerting_is_dead_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:38:21.000Z</news:publication_date>
      <news:title>Do you guys think Risk Based Alerting is dead in water with the AI landscape.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct022/i_created_a_small_lab_demo_showing_how_responder/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:26:18.000Z</news:publication_date>
      <news:title>I created a small lab demo showing how #Responder can capture NTLM hashes over a local network.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsq79/which_cyber_roles_are_truly_aiproof/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:12:41.000Z</news:publication_date>
      <news:title>Which cyber roles are truly "AI-proof"?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsguv/linkedin_is_spying_on_you_according_to_a_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:00:11.000Z</news:publication_date>
      <news:title>LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scpul1/offering_free_help_with_penetration_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:51:52.000Z</news:publication_date>
      <news:title>Offering Free Help with Penetration Testing Projects (Looking to Build Experience)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scphzz/after_the_mercor_breach_i_built_a_local_secret/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:35:24.000Z</news:publication_date>
      <news:title>After the Mercor breach, I built a local secret scanner for AI-generated code</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scojim/uk_about_to_be_over_employed_have_i_ruined_future/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T23:50:23.000Z</news:publication_date>
      <news:title>UK -About to be over employed - have I ruined future chances at obtaining SC?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scmq9l/website_provider_gave_client_an_spf_include_to_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:29:52.000Z</news:publication_date>
      <news:title>Website provider gave client an SPF include to a domain they did not control, and it was set to +all</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scm5bc/fortinet_cve202635616_actively_exploited_as_zero/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:04:19.000Z</news:publication_date>
      <news:title>Fortinet CVE-2026-35616 Actively Exploited as Zero Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sclo8j/how_i_stole_aes_keys_from_a_microcontroller_using/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:44:25.000Z</news:publication_date>
      <news:title>How I stole AES keys from a microcontroller using power analysis (ChipWhisperer walkthrough)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sckmlw/i_have_refactored_slurp_s3_bucket_enumerator_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:01:45.000Z</news:publication_date>
      <news:title>I have refactored slurp s3 bucket enumerator to work with any s3 compatible cloud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck5t9/5_yoe_appsec_at_faang_microsoft_what_is_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:43:02.000Z</news:publication_date>
      <news:title>5 YOE AppSec at FAANG (Microsoft). What is the market like for mid career candidates?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck4e3/cisco_patched_a_9810_cve_yesterday_authentication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:41:34.000Z</news:publication_date>
      <news:title>Cisco patched a 9.8/10 CVE yesterday — authentication bypass on IMC that gives full admin access with one HTTP request, no credentials needed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:30:42.000Z</news:publication_date>
      <news:title>Axios npm hack used fake Teams error fix to hijack maintainer account</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scg2ml/open_source_tool_for_supply_chain_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T18:01:15.000Z</news:publication_date>
      <news:title>Open source tool for supply chain malware detection: CTWall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sce4um/how_good_is_recruitment_in_this_space/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:46:46.000Z</news:publication_date>
      <news:title>How good is recruitment in this space</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scczit/where_to_start_in_reverse_engineering_as_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:01:54.000Z</news:publication_date>
      <news:title>Where to start in reverse engineering as an absolutely beginner with no knowledge whatsoever? Ghidra perhaps or something else</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sccnjb/browsergate_linkedinmicrosoft_allegedly_scans/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:48:42.000Z</news:publication_date>
      <news:title>BrowserGate: LinkedIn/Microsoft allegedly scans 6,000+ browser extensions &amp; links them to real identities, all without user consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbniy/burp_suite/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:08:37.000Z</news:publication_date>
      <news:title>Burp Suite</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbc8y/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:56:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb95s/browsergate_report_alleges_linkedin_is_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:52:51.000Z</news:publication_date>
      <news:title>BrowserGate: Report alleges LinkedIn is scanning 6,000+ browser extensions without consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb86j/what_can_be_done_with_an_ip_address/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:51:45.000Z</news:publication_date>
      <news:title>what can be done with an ip address</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1scak6p/apples_spotlight_search_results_come_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:24:13.000Z</news:publication_date>
      <news:title>Apple's Spotlight Search Results Come With Engagement Metrics. No One Knew.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:17:38.000Z</news:publication_date>
      <news:title>Device code phishing attacks surge 37x as new kits spread online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:09:54.000Z</news:publication_date>
      <news:title>FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sc7s4w/pcmag_hackers_are_using_claude_code_leak_as_bait/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T12:18:17.000Z</news:publication_date>
      <news:title>PCMag: Hackers Are Using Claude Code Leak As Bait to Spread Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc5xhj/researchers_uncover_mining_operation_using_iso/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:37:24.000Z</news:publication_date>
      <news:title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:31:00.000Z</news:publication_date>
      <news:title>European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:30:00.000Z</news:publication_date>
      <news:title>Hackers Are Posting the Claude Code Leak With Bonus Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc5et2/more_than_600_cyber_tools_and_resources/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:06:01.000Z</news:publication_date>
      <news:title>More than 600 cyber tools and resources</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4v8z/teampcp_supply_chain_attacks_claim_first_named/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:32:23.000Z</news:publication_date>
      <news:title>TeamPCP supply chain attacks claim first named victims as EC breach traced to Trivy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4h5p/eli5_email_man_in_the_middle/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:08:04.000Z</news:publication_date>
      <news:title>Eli5 email man in the middle</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc46lz/slopsquatscan_cli_tool_that_checks_slopsquatted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:49:53.000Z</news:publication_date>
      <news:title>SlopSquatScan - CLI tool that checks slopsquatted packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc3fju/proofofpersonhood_without_biometrics_the_irlid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:03:07.000Z</news:publication_date>
      <news:title>Proof-of-Personhood Without Biometrics: The IRLid Protocol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc32mz/flood_in_italy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T07:41:38.000Z</news:publication_date>
      <news:title>Flood in Italy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwgy7/how_long_does_it_actually_take_your_team_to_fill/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:51:46.000Z</news:publication_date>
      <news:title>How long does it actually take your team to fill out a vendor security questionnaire?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaru/ciberseguridad_oferta_de_empleo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:44.000Z</news:publication_date>
      <news:title>Ciberseguridad oferta de empleo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaq4/npm_isntall_i_svrnsecshield/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:40.000Z</news:publication_date>
      <news:title>npm isntall -I @Svrnsec/Shield</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/elastic-security-integrations-roundup-q1-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T00:00:00.000Z</news:publication_date>
      <news:title>Elastic Security Integrations Roundup: Q1 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbti2s/shieldnet_trust_posture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:37:12.000Z</news:publication_date>
      <news:title>ShieldNet Trust Posture</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtetw/gslc_value/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:33:16.000Z</news:publication_date>
      <news:title>GSLC value?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtegn/how_to_start_study_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:32:50.000Z</news:publication_date>
      <news:title>How to start study cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbt0xz/hr_reviewing_my_interview_am_i_close_to_an_offer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:16:32.000Z</news:publication_date>
      <news:title>HR reviewing my interview — am I close to an offer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/that-dream-job-offer-from-coca-cola-or-ferrari-its-a-trap-for-your-passwords</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:13:58.000Z</news:publication_date>
      <news:title>That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsoz8/how_to_pivot_into_ot/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:02:27.000Z</news:publication_date>
      <news:title>How to pivot into OT?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsohg/architecture_review_preventing_shadow_ai_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:01:49.000Z</news:publication_date>
      <news:title>Architecture Review: Preventing "Shadow AI" data leaks with a stateless PII firewall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:38.000Z</news:publication_date>
      <news:title>When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbr7kq/openais_gpt54_got_blocked_by_safety_mechanisms_5/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:23.000Z</news:publication_date>
      <news:title>OpenAI's GPT-5.4 got blocked by safety mechanisms 5 times, searched my machine for tools to bypass them, launched Claude Opus with dangerously bypass permissions flags, tried to COVER UP what he had done, then gave me a "perfect" apology when caught</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbqnv6/chinalinked_ta416_targets_european_governments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:38:26.000Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:28:14.000Z</news:publication_date>
      <news:title>Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.darkreading.com/data-privacy/inconsistent-privacy-labels-not-enough</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:05:07.000Z</news:publication_date>
      <news:title>Inconsistent Privacy Labels Don't Tell Users What They Are Getting</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbpkx6/for_eu_companies_is_zero_data_liability_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:56:33.000Z</news:publication_date>
      <news:title>For EU companies' Is "Zero Data Liability" actually a budget priority?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:40:22.000Z</news:publication_date>
      <news:title>LinkedIn secretly scans for 6,000+ Chrome extensions, collects data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/linkedin-secretely-scans-for-6-000-plus-chrome-extensions-collects-data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:40:22.000Z</news:publication_date>
      <news:title>LinkedIn secretely scans for 6,000+ Chrome extensions, collects data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/fcc-proposes-5-million-fine-robocall</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:12:00.000Z</news:publication_date>
      <news:title>FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://therecord.media/trueconf-cyberattack-cisa-hackers</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:45:00.000Z</news:publication_date>
      <news:title>CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers</news:title>
    </news:news>
  </url>
</urlset>