<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/73-seconds-to-breach-24-hours-to-patch-the-case-for-autonomous-validation/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T12:21:13.927701+00:00</news:publication_date>
      <news:title>AI Breaches in 73 Secs: Patching Can't Keep Up</news:title>
      <news:keywords>AI security, autonomous validation, exploit development, threat intelligence, vulnerability management, zero-days</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/global-cyber-agencies-issue-new-sboms-for-ai-guidance-to-tackle-ai-supply-chain-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T11:38:40.158870+00:00</news:publication_date>
      <news:title>G7 AI SBOMs: A New Weapon or Just More Paperwork?</news:title>
      <news:keywords>AI security, cybersecurity guidance, g7, sbom, supply chain risk</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hundreds-of-malicious-packages-force-rubygems-to-suspend-registrations/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T09:02:32.495465+00:00</news:publication_date>
      <news:title>RubyGems Suspends Registrations After Malicious Package Flood</news:title>
      <news:keywords>malicious packages, open source security, rubygems, software supply chain, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/ics-patch-tuesday-new-security-advisories-from-siemens-schneider-cisa/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T08:45:14.891642+00:00</news:publication_date>
      <news:title>ICS Patch Tuesday: Critical Flaws Surface</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-13-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T07:00:02.277490+00:00</news:publication_date>
      <news:title>Daily Briefing: May 13, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/us-govt-seeks-instructure-testimony-on-massive-canvas-cyberattack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T06:00:01.814752+00:00</news:publication_date>
      <news:title>Canvas Breach: US House Demands Instructure Testimony</news:title>
      <news:keywords>ShinyHunters, canvas, cyberattack, data breach, homeland security, instructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/webinar-fixing-the-gaps-in-network-incident-response/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T05:50:38.278753+00:00</news:publication_date>
      <news:title>Incident Response: Manual Triage is Failing</news:title>
      <news:keywords>AI in Security, IT automation, Tines, alert triage, network incident response</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T05:45:18.314130+00:00</news:publication_date>
      <news:title>AI Generates Attack Logs: Is Detection Engineering Ready?</news:title>
      <news:keywords>AI, attack logs, cybersecurity, detection engineering, microsoft-defender, synthetic data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T05:20:26.635701+00:00</news:publication_date>
      <news:title>Microsoft's MDASH: AI Security Agents Discover Critical Windows Flaws</news:title>
      <news:keywords>AI security, Windows security, agentic AI, cyber defense, microsoft mdash, vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-finds-16-new-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T05:18:19.426562+00:00</news:publication_date>
      <news:title>Microsoft's AI Security Agent Finds 16 New Vulns</news:title>
      <news:keywords>AI security, Windows security, agentic AI, cyber defense, microsoft, vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/microsoft-releases-windows-10-kb5087544-extended-security-update/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:56:47.268554+00:00</news:publication_date>
      <news:title>Windows 10 Security Update (2026) | Remote Desktop Fixes</news:title>
      <news:keywords>Secure Boot, kb5087544, microsoft, remote desktop, security update, windows 10</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/microsofts-may-2026-patch-tuesday-addresses-118-cves-cve-2026-41103/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:10:42.792788+00:00</news:publication_date>
      <news:title>Microsoft's May 2026 Patch Tuesday: 118 Flaws</news:title>
      <news:keywords>Microsoft Patch Tuesday, cve, elevation of privilege, remote code execution, sso plugin, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/android-17-to-expand-banking-scam-call-and-privacy-protections/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:01:30.045835+00:00</news:publication_date>
      <news:title>Android 17: AI Fights Bank Scams, Boosts Theft Protection</news:title>
      <news:keywords>AI security, android 17, banking scams, cybersecurity, device theft protection, google android</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/undermining-the-trust-boundary-investigating-a-stealthy-intrusion-through-third-party-compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:40:52.324777+00:00</news:publication_date>
      <news:title>Third-Party Compromise: The Silent Invasion of Trusted Systems</news:title>
      <news:keywords>IT services providers, Microsoft Incident Response, administrative tools, stealthy intrusion, third-party compromise, trust boundary</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:56:34.009245+00:00</news:publication_date>
      <news:title>TrickMo Uses TON for Android Network Pivots</news:title>
      <news:keywords>Android malware, SOCKS5 proxy, TON, The Open Network, TrickMo, network pivot</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/apple-patches-dozens-of-vulnerabilities-in-macos-ios/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:31:38.743640+00:00</news:publication_date>
      <news:title>Apple Patches Dozens of Flaws [Urgent Update Required]</news:title>
      <news:keywords>apple, cve, cybersecurity, ios security, macOS security, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/20-leaders-who-built-the-ciso-era-2-decades-of-change/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:20:45.711816+00:00</news:publication_date>
      <news:title>CISO Era's Architects: 20 Years of Risk Rewritten</news:title>
      <news:keywords>CISO, cybersecurity, enterprise risk management, security leaders</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-agentic-ai-is-securitys-next-blind-spot/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T11:35:06.779557+00:00</news:publication_date>
      <news:title>Agentic AI Security Gap: What It Means for You</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/malicious-hugging-face-repository-typosquats-openai/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:26:23.676436+00:00</news:publication_date>
      <news:title>Hugging Face Hack: AI Supply Chain Danger Exposed</news:title>
      <news:keywords>AI supply chain, OpenAI, cybersecurity, hugging face, infostealer malware, typosquatting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/official-checkmarx-jenkins-package-compromised-with-infostealer/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:06:13.709655+00:00</news:publication_date>
      <news:title>Checkmarx Jenkins Plugin Hijacked [Infostealer Attack]</news:title>
      <news:keywords>checkmarx, ci/cd, devsecops, infostealer, jenkins, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-365tb-canvas-leak/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:51:52.969511+00:00</news:publication_date>
      <news:title>Canvas Pays Ransom: 3.65TB Data Stolen, Schools Left Exposed</news:title>
      <news:keywords>ShinyHunters, canvas, cybersecurity, data leak, instructure, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-12-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:00:01.912895+00:00</news:publication_date>
      <news:title>Daily Briefing: May 12, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/state-of-ransomware-in-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:45:35.977022+00:00</news:publication_date>
      <news:title>Ransomware in 2026: Quantum, No Encryption, and EDR Killers</news:title>
      <news:keywords>EDR killers, Kaspersky, RDWeb, encryptionless extortion, post-quantum cryptography, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-ghostlock-tool-abuses-windows-api-to-block-file-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T05:57:47.765227+00:00</news:publication_date>
      <news:title>GhostLock Tool Locks Files Via Windows API [Security Alert]</news:title>
      <news:keywords>Denial of Service, Windows API, file access, ghostlock, security exploit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/as-the-nvd-scales-back-cve-enrichment-heres-what-tenable-customers-need-to-know/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T05:50:15.988021+00:00</news:publication_date>
      <news:title>NVD Scales Back CVE Enrichment: What Tenable Customers Need to Know</news:title>
      <news:keywords>CVE enrichment, NVD, Tenable, cybersecurity risk, vulnerability intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/eyes-wide-open-how-to-mitigate-the-security-and-privacy-risks-of-smart-glasses/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T05:30:37.538530+00:00</news:publication_date>
      <news:title>Smart Glasses: Your Face is Now a Data Mine</news:title>
      <news:keywords>AI, data breach, privacy, security, smart glasses, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:08:48.495161+00:00</news:publication_date>
      <news:title>TeamPCP Hits Checkmarx Again: The Supply Chain Trust Game</news:title>
      <news:keywords>TeamPCP, ast plugin, checkmarx, cybersecurity, jenkins, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/final-countdown-last-chance-to-join-the-rapid7-global-cybersecurity-summit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T18:01:50.374128+00:00</news:publication_date>
      <news:title>Rapid7 Summit: AI, Exposure, and SOC Realities for 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/gtig-ai-threat-tracker-adversaries-leverage-ai-for-vulnerability-exploitation-augmented-operations-and-initial-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:15:42.321453+00:00</news:publication_date>
      <news:title>AI Used for Exploits: What It Means for You</news:title>
      <news:keywords>ai threat intelligence, generative ai security, malware development, nation-state threats, supply chain attacks, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:32:59.421885+00:00</news:publication_date>
      <news:title>Dirty Frag Exploit Hits Enterprise Linux [Analysis]</news:title>
      <news:keywords>cybersecurity, dirty frag, enterprise linux, linux exploit, privilege escalation, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/feeding-frenzy-rce-on-azure-cosmos-for-postgresql/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:56:58.118738+00:00</news:publication_date>
      <news:title>Azure RCE: Cosmos DB Feeding Frenzy Uncovered</news:title>
      <news:keywords>RCE vulnerability, Varonis, azure cosmos for postgresql, cloud security, database vulnerability, feeding frenzy</news:keywords>
    </news:news>
  </url>
</urlset>
