<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">

  <url>
    <loc>https://www.darkreading.com/events/black-hat-usa</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-08-01T11:00:00.000Z</news:publication_date>
      <news:title>Black Hat USA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdd6l8/cysa_renewal_question/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:49:57.000Z</news:publication_date>
      <news:title>CySA+ renewal question</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:44:10.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdck5c/fake_claude_code_source_downloads_actually/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:25:03.000Z</news:publication_date>
      <news:title>Fake Claude Code source downloads actually delivered malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdcamw/for_my_security_compliance_folks_and_individuals/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T19:14:34.000Z</news:publication_date>
      <news:title>For my security compliance folks and individuals creating response documentation, what tools or templates do you use? Im trying "responseprep" at the moment. It makes the initial work so much easier for final edits. With all the new shiny tools out there, who's using what or are you hand writing?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:45:17.000Z</news:publication_date>
      <news:title>New FortiClient EMS flaw exploited in attacks, emergency patch released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/285-million-drift-hack-traced-to-six.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:25:00.000Z</news:publication_date>
      <news:title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sdas5w/linux_70rc7_adding_more_documentation_for_ai/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T18:15:44.000Z</news:publication_date>
      <news:title>Linux 7.0-rc7 adding more documentation for AI tools to send better security bug reports</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sda9ce/a_deeper_look_at_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:55:41.000Z</news:publication_date>
      <news:title>A Deeper Look at RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sda8qp/reverse_engineering_rustimplant/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:54:59.000Z</news:publication_date>
      <news:title>Reverse Engineering RustImplant</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd9uaa/quieres_aprender_a_cazar_amenazas_en_la_dark_web/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T17:39:31.000Z</news:publication_date>
      <news:title>🔥 ¿Quieres aprender a cazar amenazas en la Dark Web? La próxima semana iniciamos el curso de Dark Cyber Threat Intelligence. Te llevamos de lo básico a lo avanzado: investigación en foros oscuros, análisis de malware underground y mucho más. 👉 Obtén un 60% de descuento usando el cupón WILLIE60</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8mc1/cyber_awareness_jeff_3d_figure/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:51:57.000Z</news:publication_date>
      <news:title>Cyber Awareness Jeff 3D Figure!</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd8a5e/is_ai_making_cybersecurity_stronger_or_just/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:38:35.000Z</news:publication_date>
      <news:title>Is AI making cybersecurity stronger or just supercharging hackers too?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd7rtm/anthropic_ran_an_ai_bug_bounty_on_open_source_for/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:18:37.000Z</news:publication_date>
      <news:title>Anthropic ran an AI bug bounty on open source for a month. It found 500+ zero-days.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd7hzh/gddrhammer_and_geforge_gddr6_gpu_rowhammer_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T16:08:04.000Z</news:publication_date>
      <news:title>GDDRHammer and GeForge: GDDR6 GPU Rowhammer to root shell (IEEE S&amp;P 2026, exploit code available)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd720i/is_cybersecurity_still_at_its_core_a_human_problem/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:41.000Z</news:publication_date>
      <news:title>Is cybersecurity still, at its core, a human problem?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd71k6/your_email_gateway_has_a_blind_spot_apts_already/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:50:11.000Z</news:publication_date>
      <news:title>Your Email Gateway Has a Blind Spot. APTs Already Know About It.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd6is7/syd_doing_a_full_exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:29:14.000Z</news:publication_date>
      <news:title>syd doing a full exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/hackers-exploit-react2shell-in-automated-credential-theft-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T14:17:23.000Z</news:publication_date>
      <news:title>Hackers exploit React2Shell in automated credential theft campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd30zy/certified_network_security_practitioner_cnsp/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T13:00:30.000Z</news:publication_date>
      <news:title>Certified Network Security Practitioner (CNSP) Study Materials?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd2vtq/anyone_interested_in_offline_ctf_event_in_india/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:53:30.000Z</news:publication_date>
      <news:title>Anyone interested in Offline ctf event in india ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1wh3/built_a_tool_to_stop_the_pain_of_manual_evtx/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T12:04:57.000Z</news:publication_date>
      <news:title>Built a tool to stop the pain of manual EVTX triage</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd1cgd/can_you_guys_me_suggestions_should_i_do_bca_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:34:43.000Z</news:publication_date>
      <news:title>Can you guys me suggestions, should i do BCA in Cyber Security or something else to get into CS field ?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0tzy/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T11:05:25.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0qbj/deployed_goadlight_on_virtualbox_ubuntu_2404/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:57.000Z</news:publication_date>
      <news:title>Deployed GOAD-Light on VirtualBox (Ubuntu 24.04) - sharing my guide with the real errors I hit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sd0q71/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:59:45.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0nzk/36_malicious_npm_packages_exploited_redis/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:56:03.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sd0667/soc_analyst_1/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T10:25:46.000Z</news:publication_date>
      <news:title>SOC Analyst 1</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:00:00.000Z</news:publication_date>
      <news:title>The Hack That Exposed Syria’s Sweeping Security Failures</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scyj3y/feeling_stuck_and_looking_for_honest_advice_on/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:41:38.000Z</news:publication_date>
      <news:title>feeling stuck and looking for honest advice on whats next</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scy246/about_to_take_ejpt_help/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:11:26.000Z</news:publication_date>
      <news:title>About to take eJPT. help..</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scxx6w/cyber_crimes_attempt_preperation/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:02:50.000Z</news:publication_date>
      <news:title>Cyber crimes &amp; attempt - preperation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T08:00:49.000Z</news:publication_date>
      <news:title>Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1scx6s9/database_of_malicious_chromeedge_extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:17:46.000Z</news:publication_date>
      <news:title>Database of malicious Chrome/Edge extensions - auto-updated daily</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://industrialcyber.co/features/rising-breach-costs-and-operational-downtime-redefine-economics-of-ot-cybersecurity-making-it-boardroom-priority/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:55:32.000Z</news:publication_date>
      <news:title>Rising breach costs and operational downtime redefine economics of OT cybersecurity making it boardroom priority</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwnd9/the_visible_key_a_new_way_to_verify_source/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:45:42.000Z</news:publication_date>
      <news:title>The Visible Key — A New Way to Verify Source</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scwfwe/are_companies_pushing_the_good_guys_to_go_rogue/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:33:08.000Z</news:publication_date>
      <news:title>Are companies pushing the good guys to go rogue?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T05:07:00.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T04:32:00.000Z</news:publication_date>
      <news:title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct8hp/do_you_guys_think_risk_based_alerting_is_dead_in/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:38:21.000Z</news:publication_date>
      <news:title>Do you guys think Risk Based Alerting is dead in water with the AI landscape.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sct022/i_created_a_small_lab_demo_showing_how_responder/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:26:18.000Z</news:publication_date>
      <news:title>I created a small lab demo showing how #Responder can capture NTLM hashes over a local network.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsq79/which_cyber_roles_are_truly_aiproof/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:12:41.000Z</news:publication_date>
      <news:title>Which cyber roles are truly "AI-proof"?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scsguv/linkedin_is_spying_on_you_according_to_a_new/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T03:00:11.000Z</news:publication_date>
      <news:title>LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scpul1/offering_free_help_with_penetration_testing/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:51:52.000Z</news:publication_date>
      <news:title>Offering Free Help with Penetration Testing Projects (Looking to Build Experience)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scphzz/after_the_mercor_breach_i_built_a_local_secret/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T00:35:24.000Z</news:publication_date>
      <news:title>After the Mercor breach, I built a local secret scanner for AI-generated code</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scojim/uk_about_to_be_over_employed_have_i_ruined_future/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T23:50:23.000Z</news:publication_date>
      <news:title>UK -About to be over employed - have I ruined future chances at obtaining SC?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scmq9l/website_provider_gave_client_an_spf_include_to_a/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:29:52.000Z</news:publication_date>
      <news:title>Website provider gave client an SPF include to a domain they did not control, and it was set to +all</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scm5bc/fortinet_cve202635616_actively_exploited_as_zero/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:04:19.000Z</news:publication_date>
      <news:title>Fortinet CVE-2026-35616 Actively Exploited as Zero Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sclo8j/how_i_stole_aes_keys_from_a_microcontroller_using/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:44:25.000Z</news:publication_date>
      <news:title>How I stole AES keys from a microcontroller using power analysis (ChipWhisperer walkthrough)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sckmlw/i_have_refactored_slurp_s3_bucket_enumerator_to/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:01:45.000Z</news:publication_date>
      <news:title>I have refactored slurp s3 bucket enumerator to work with any s3 compatible cloud</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck5t9/5_yoe_appsec_at_faang_microsoft_what_is_the/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:43:02.000Z</news:publication_date>
      <news:title>5 YOE AppSec at FAANG (Microsoft). What is the market like for mid career candidates?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sck4e3/cisco_patched_a_9810_cve_yesterday_authentication/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:41:34.000Z</news:publication_date>
      <news:title>Cisco patched a 9.8/10 CVE yesterday — authentication bypass on IMC that gives full admin access with one HTTP request, no credentials needed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:30:42.000Z</news:publication_date>
      <news:title>Axios npm hack used fake Teams error fix to hijack maintainer account</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scg2ml/open_source_tool_for_supply_chain_malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T18:01:15.000Z</news:publication_date>
      <news:title>Open source tool for supply chain malware detection: CTWall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sce4um/how_good_is_recruitment_in_this_space/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:46:46.000Z</news:publication_date>
      <news:title>How good is recruitment in this space</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scczit/where_to_start_in_reverse_engineering_as_an/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:01:54.000Z</news:publication_date>
      <news:title>Where to start in reverse engineering as an absolutely beginner with no knowledge whatsoever? Ghidra perhaps or something else</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sccnjb/browsergate_linkedinmicrosoft_allegedly_scans/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:48:42.000Z</news:publication_date>
      <news:title>BrowserGate: LinkedIn/Microsoft allegedly scans 6,000+ browser extensions &amp; links them to real identities, all without user consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbniy/burp_suite/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T15:08:37.000Z</news:publication_date>
      <news:title>Burp Suite</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scbc8y/removed_by_reddit/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:56:19.000Z</news:publication_date>
      <news:title>[ Removed by Reddit ]</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb95s/browsergate_report_alleges_linkedin_is_scanning/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:52:51.000Z</news:publication_date>
      <news:title>BrowserGate: Report alleges LinkedIn is scanning 6,000+ browser extensions without consent</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1scb86j/what_can_be_done_with_an_ip_address/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:51:45.000Z</news:publication_date>
      <news:title>what can be done with an ip address</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1scak6p/apples_spotlight_search_results_come_with/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:24:13.000Z</news:publication_date>
      <news:title>Apple's Spotlight Search Results Come With Engagement Metrics. No One Knew.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:17:38.000Z</news:publication_date>
      <news:title>Device code phishing attacks surge 37x as new kits spread online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:09:54.000Z</news:publication_date>
      <news:title>FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/Malware/comments/1sc7s4w/pcmag_hackers_are_using_claude_code_leak_as_bait/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T12:18:17.000Z</news:publication_date>
      <news:title>PCMag: Hackers Are Using Claude Code Leak As Bait to Spread Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc5xhj/researchers_uncover_mining_operation_using_iso/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:37:24.000Z</news:publication_date>
      <news:title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.securityweek.com/european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:31:00.000Z</news:publication_date>
      <news:title>European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/security-news-this-week-hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:30:00.000Z</news:publication_date>
      <news:title>Hackers Are Posting the Claude Code Leak With Bonus Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc5et2/more_than_600_cyber_tools_and_resources/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:06:01.000Z</news:publication_date>
      <news:title>More than 600 cyber tools and resources</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4v8z/teampcp_supply_chain_attacks_claim_first_named/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:32:23.000Z</news:publication_date>
      <news:title>TeamPCP supply chain attacks claim first named victims as EC breach traced to Trivy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc4h5p/eli5_email_man_in_the_middle/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:08:04.000Z</news:publication_date>
      <news:title>Eli5 email man in the middle</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc46lz/slopsquatscan_cli_tool_that_checks_slopsquatted/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:49:53.000Z</news:publication_date>
      <news:title>SlopSquatScan - CLI tool that checks slopsquatted packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sc3fju/proofofpersonhood_without_biometrics_the_irlid/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:03:07.000Z</news:publication_date>
      <news:title>Proof-of-Personhood Without Biometrics: The IRLid Protocol</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sc32mz/flood_in_italy/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T07:41:38.000Z</news:publication_date>
      <news:title>Flood in Italy</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwgy7/how_long_does_it_actually_take_your_team_to_fill/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:51:46.000Z</news:publication_date>
      <news:title>How long does it actually take your team to fill out a vendor security questionnaire?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaru/ciberseguridad_oferta_de_empleo/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:44.000Z</news:publication_date>
      <news:title>Ciberseguridad oferta de empleo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbwaq4/npm_isntall_i_svrnsecshield/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T01:43:40.000Z</news:publication_date>
      <news:title>npm isntall -I @Svrnsec/Shield</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.elastic.co/security-labs/elastic-security-integrations-roundup-q1-2026</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T00:00:00.000Z</news:publication_date>
      <news:title>Elastic Security Integrations Roundup: Q1 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/netsec/comments/1sbti2s/shieldnet_trust_posture/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:37:12.000Z</news:publication_date>
      <news:title>ShieldNet Trust Posture</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtetw/gslc_value/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:33:16.000Z</news:publication_date>
      <news:title>GSLC value?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbtegn/how_to_start_study_cybersecurity/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:32:50.000Z</news:publication_date>
      <news:title>How to start study cybersecurity?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbt0xz/hr_reviewing_my_interview_am_i_close_to_an_offer/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:16:32.000Z</news:publication_date>
      <news:title>HR reviewing my interview — am I close to an offer?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.malwarebytes.com/blog/threat-intel/2026/04/that-dream-job-offer-from-coca-cola-or-ferrari-its-a-trap-for-your-passwords</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:13:58.000Z</news:publication_date>
      <news:title>That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsoz8/how_to_pivot_into_ot/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:02:27.000Z</news:publication_date>
      <news:title>How to pivot into OT?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbsohg/architecture_review_preventing_shadow_ai_data/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:01:49.000Z</news:publication_date>
      <news:title>Architecture Review: Preventing "Shadow AI" data leaks with a stateless PII firewall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:38.000Z</news:publication_date>
      <news:title>When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbr7kq/openais_gpt54_got_blocked_by_safety_mechanisms_5/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:00:23.000Z</news:publication_date>
      <news:title>OpenAI's GPT-5.4 got blocked by safety mechanisms 5 times, searched my machine for tools to bypass them, launched Claude Opus with dangerously bypass permissions flags, tried to COVER UP what he had done, then gave me a "perfect" apology when caught</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.reddit.com/r/cybersecurity/comments/1sbqnv6/chinalinked_ta416_targets_european_governments/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:38:26.000Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.wired.com/story/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>ThreatAft</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:28:14.000Z</news:publication_date>
      <news:title>Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk</news:title>
    </news:news>
  </url>
</urlset>