<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/over-40000-servers-compromised-in-ongoing-cpanel-exploitation/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:44:56.054902+00:00</news:publication_date>
      <news:title>cPanel Servers Under Siege: 40K+ Compromised by Zero-Day</news:title>
      <news:keywords>CVE-2026-41940, cPanel, server compromise, web hosting security, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edtech-firm-instructure-discloses-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:05:59.031950+00:00</news:publication_date>
      <news:title>Instructure Breach: 275M Records Compromised, ShinyHunters Claims</news:title>
      <news:keywords>ShinyHunters, canvas, cyberattack, data breach, edtech, instructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-04-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T07:00:02.160208+00:00</news:publication_date>
      <news:title>Daily Briefing: May 04, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/mdr-selection-is-a-partnership-decision/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:39:46.146910+00:00</news:publication_date>
      <news:title>MDR: It's Not Tech, It's a Partnership [Analysis]</news:title>
      <news:keywords>MDR, cybersecurity partnerships, managed detection and response, security operations, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/6th-april-threat-intelligence-report/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:55:14.410061+00:00</news:publication_date>
      <news:title>AI Agents Gone Wild: Data Leaks, Credential Theft | Threat Digest</news:title>
      <news:keywords>AI security, ChatGPT, Drift Protocol, European Commission, Hasbro, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/27th-april-threat-intelligence-report/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:52:20.106779+00:00</news:publication_date>
      <news:title>Cyber Threats: Data Breaches & AI Exploits Explode</news:title>
      <news:keywords>AI threats, cyber security, data breach, espionage, ransomware, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:41:46.055735+00:00</news:publication_date>
      <news:title>ChatGPT Data Leak: Hidden Channel Exposes User Info</news:title>
      <news:keywords>ChatGPT, code execution, data leak, openai, security research, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/digital-assets-after-death-managing-risks-to-your-loved-ones-digital-estate/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:31:49.784709+00:00</news:publication_date>
      <news:title>Digital Estates: From Forgotten Logins to Identity Theft Nightmare</news:title>
      <news:keywords>digital estate, digital legacy, estate planning, fraud, identity theft, online inheritance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/supply-chain-dependencies-have-you-checked-your-blind-spot/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:22:20.361479+00:00</news:publication_date>
      <news:title>Supply chain dependencies: Have you checked your blind spot?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/wireshark-465-released-sun-may-3rd/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:32:46.388698+00:00</news:publication_date>
      <news:title>Wireshark 4.6.5: AI Fuels 43 Security Fixes</news:title>
      <news:keywords>artificial intelligence, cve, cybersecurity, network analysis, vulnerabilities, wireshark</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T18:21:57.558623+00:00</news:publication_date>
      <news:title>Gemini CLI & Cursor: Critical RCE Flaws Patched</news:title>
      <news:keywords>cursor ide, cvss 10, gemini cli, rce, remote code execution, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/90000-screenshots-of-one-celebritys-phone-were-exposed-online/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T15:42:26.101653+00:00</news:publication_date>
      <news:title>90,000 Screenshots: Celebrity Phone Data Exposed Online</news:title>
      <news:keywords>celebrity privacy, cocospy, data exposure, spyware, stalkerware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/openai-rolls-out-advanced-security-mode-for-at-risk-accounts/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T15:32:36.752732+00:00</news:publication_date>
      <news:title>OpenAI: New Security Mode Deployed</news:title>
      <news:keywords>OpenAI, account security, chatgpt, passkeys, security keys, two-factor authentication</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/telegram-mini-apps-abused-for-crypto-scams-android-malware-delivery/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T14:35:33.348013+00:00</news:publication_date>
      <news:title>Telegram Scams Exploit Mini Apps</news:title>
      <news:keywords>Android malware, crypto scams, femibot, mini apps, phishing, telegram</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T13:50:37.575639+00:00</news:publication_date>
      <news:title>Beyond the Green Dashboards: Real Security Needs More Than Just Patches</news:title>
      <news:keywords>cyber threat intelligence, cybersecurity, exposure management, risk reduction, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/microsoft-fixes-remote-desktop-warnings-displaying-incorrectly/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T12:13:56.069774+00:00</news:publication_date>
      <news:title>Microsoft's RDP Fix: A Patch, Not a Panacea?</news:title>
      <news:keywords>microsoft, phishing, rdp files, remote desktop, security warnings, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T11:18:50.914809+00:00</news:publication_date>
      <news:title>LiteLLM SQLi Exploited in 36 Hours [CVE-2026-42208]</news:title>
      <news:keywords>AI security, CVE-2026-42208, LLM vulnerabilities, LiteLLM, SQL injection, open source security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/meet-bluekit-the-ai-powered-all-in-one-phishing-kit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:54:17.353460+00:00</news:publication_date>
      <news:title>Phishing Kit Ditches Old Ways for AI [Bluekit Analysis]</news:title>
      <news:keywords>AI in cybersecurity, Bluekit, cybercrime tools, phishing kits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:50:07.782775+00:00</news:publication_date>
      <news:title>CISA Flags Exploited ConnectWise, Windows Bugs</news:title>
      <news:keywords>CISA, CVE-2024-1708, ConnectWise ScreenConnect, KEV, Known Exploited Vulnerabilities, Microsoft Windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-to-watch-this-week-zero-trusts-blind-spots-and-ais-evolving-menace-20260503/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:00:05.060763+00:00</news:publication_date>
      <news:title>What to Watch This Week: Zero Trust's Blind Spots and AI's Evolving Menace</news:title>
      <news:keywords>AI, analysis, cybersecurity, predictions, ransomware, trends</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/story-retracted/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T07:43:56.215672+00:00</news:publication_date>
      <news:title>Exploit Chain Unleashed: Zero-Days Cascade</news:title>
      <news:keywords>cybersecurity, exploit chain, sandbox bypass, threat intelligence, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-03-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T07:00:01.958223+00:00</news:publication_date>
      <news:title>Daily Briefing: May 03, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/five-things-we-took-away-from-gartner-srm-sydney-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T06:36:40.400043+00:00</news:publication_date>
      <news:title>Gartner Sydney: Security Budgets Shift to Resilience, Not Just 'Breach or Else'</news:title>
      <news:keywords>SecOps, business resilience, cybersecurity budgets, gartner, platform consolidation, srm sydney</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/experts-on-experts-the-2026-threat-landscape-is-moving-faster-than-defenders-expect/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:33:31.747920+00:00</news:publication_date>
      <news:title>2026 Threat Landscape: Attackers Faster Than Defenders</news:title>
      <news:keywords>2026 threat landscape, AI in cybersecurity, MFA, cybersecurity, threat acceleration, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:30:47.196737+00:00</news:publication_date>
      <news:title>Criminal IP & ThreatQ: Merging IP Intel for Faster Investigations</news:title>
      <news:keywords>Criminal IP, IP reputation, Securonix, ThreatQ, cybersecurity, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2026-41940-cpanel-whm-authentication-bypass/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:15:45.332836+00:00</news:publication_date>
      <news:title>cPanel Auth Bypass: 9.8 CVSS Flaw Exploited</news:title>
      <news:keywords>CVE-2026-41940, WHM, authentication bypass, cPanel, web hosting, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-success-illusion-how-cross-tenant-ropc-can-gaslight-your-soc-and-poison-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T19:17:56.732571+00:00</news:publication_date>
      <news:title>[Warning] 'Ghost Logins' Fool SIEMs, Tax SOC Teams</news:title>
      <news:keywords>SIEM, UEBA, azure ad, entra id, ropc, security logs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T18:11:32.869754+00:00</news:publication_date>
      <news:title>China Hackers Hit Asia Govts, NATO, Journalists [New Campaign]</news:title>
      <news:keywords>GLITTER CARP, SEQUIN CARP, SHADOW-EARTH-053, Trend Micro, china-linked hackers, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/if-ais-so-smart-why-does-it-keep-deleting-production-databases/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T16:39:16.336442+00:00</news:publication_date>
      <news:title>AI Deleting Data? It's Not AI, It's Bad Testing. [Analysis]</news:title>
      <news:keywords>AI agents, AI security, data loss, production databases, security testing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T16:11:14.579868+00:00</news:publication_date>
      <news:title>SaaS Extortion: Vishing & SSO Abuse Fueling Rapid Cyberattacks</news:title>
      <news:keywords>SSO abuse, SaaS security, cybercrime, data extortion, identity provider, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:01:38.030408+00:00</news:publication_date>
      <news:title>ConsentFix v3 Hits Azure: What It Means for You</news:title>
      <news:keywords>Azure, MFA bypass, account takeover, consentfix v3, cybersecurity, oauth</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edtech-firm-instructure-confirms-data-breach-after-salesforce-instance-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:48:28.446308+00:00</news:publication_date>
      <news:title>Instructure Suffers Salesforce Hack, Edtech Sector Under Fire</news:title>
      <news:keywords>ShinyHunters, data breach, edtech, instructure, salesforce, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-bluekit-phishing-kit-features-ai-assistant/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T12:07:46.783755+00:00</news:publication_date>
      <news:title>Bluekit Phishing Kit Adds AI Assistant, Threatens Real People</news:title>
      <news:keywords>AI, Bluekit, Varonis, cybersecurity, malware, phishing kit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/disneyland-now-uses-face-recognition-on-visitors/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:08:32.972508+00:00</news:publication_date>
      <news:title>Disney's New Face Tech: Creepy Surveillance or Convenient Entry?</news:title>
      <news:keywords>AI, NSA, biometric data, disneyland, face recognition, privacy</news:keywords>
    </news:news>
  </url>
</urlset>
