<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-february-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T19:13:38.011548+00:00</news:publication_date>
      <news:title>[February 2026] AI Powers 600+ FortiGate Hacks & ATM Jackpots</news:title>
      <news:keywords>ATM jackpotting, FortiGate hacks, PromptSpy, cybersecurity February 2026, generative AI malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/protecting-education-how-mdr-can-tip-the-balance-in-favor-of-schools/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T18:15:24.056564+00:00</news:publication_date>
      <news:title>Ransomware on Schools Up 23% in 2025: MDR Hype or Help?</news:title>
      <news:keywords>MDR, education cybersecurity, nation-state threats, ransomware schools</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-smbs-use-threat-research-and-mdr-to-build-a-defensive-edge/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:53:01.353411+00:00</news:publication_date>
      <news:title>SMBs Cut Breach Risks 40% with MDR + Threat Intel [ESET Data]</news:title>
      <news:keywords>ESET, MDR, SMB cybersecurity, ransomware defense, threat research</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-cybersecurity-actually-does-for-your-business/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:56:31.126578+00:00</news:publication_date>
      <news:title>Cybersecurity ROI: Proving Value When Nothing Happens</news:title>
      <news:keywords>MDR, cybersecurity ROI, data breach cost, risk management, security budget</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cyber-fallout-from-the-iran-war-what-to-have-on-your-radar/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:49:14.124746+00:00</news:publication_date>
      <news:title>War in the Wires: Iran Attacks Cloud Data Centers</news:title>
      <news:keywords>Iran cyber attacks, cloud security, data center attacks, faketivism, nation-state threats, supply chain compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/sednit-reloaded-back-in-the-trenches/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:32:57.886149+00:00</news:publication_date>
      <news:title>Sednit Reloaded: Old Code, New Tricks [Ukraine]</news:title>
      <news:keywords>APT28, Fancy Bear, cyber espionage, malware, sednit, ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/face-value-what-it-takes-to-fool-facial-recognition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:27:31.043448+00:00</news:publication_date>
      <news:title>Facial Recognition Fools: Can You Trust Your Face?</news:title>
      <news:keywords>AI, biometric security, cybersecurity, facial recognition, identity verification, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edr-killers-explained-beyond-the-drivers/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:34:15.428130+00:00</news:publication_date>
      <news:title>EDR Killers: The $100M Problem Hackers Can't Ignore</news:title>
      <news:keywords>BYOVD, EDR killer, cybersecurity, malware analysis, ransomware, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/move-fast-and-save-things-a-quick-guide-to-recovering-a-hacked-account/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:04:28.582079+00:00</news:publication_date>
      <news:title>Hack Recovery: Act Fast or Lose It</news:title>
      <news:keywords>account recovery, cybersecurity, hacked accounts, malware, online security, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/rsac-2026-wrap-up-week-in-security-with-tony-anscombe/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:02:39.052353+00:00</news:publication_date>
      <news:title>RSAC 2026: AI Is Here. Are You?</news:title>
      <news:keywords>AI agents, AI security, RSAC 2026, cybersecurity risks, threat landscape</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cloud-workload-security-mind-the-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:22:31.549212+00:00</news:publication_date>
      <news:title>Cloud Security: The Messy Reality of Complexity</news:title>
      <news:keywords>Frankencloud, cloud visibility, cloud workload security, cybersecurity complexity, data breach costs, security automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-13-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:00:06.479304+00:00</news:publication_date>
      <news:title>Daily Briefing: April 13, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:51:42.899142+00:00</news:publication_date>
      <news:title>Cyber Breakout Time: 80% of RaaS Groups Use AI</news:title>
      <news:keywords>AI cybersecurity, MDR, RaaS, XDR, breakout time, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-march-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:46:28.442906+00:00</news:publication_date>
      <news:title>March Security: Hackers Hit Medtech, Data Theft Soars</news:title>
      <news:keywords>cybersecurity, data breach, encryption, phishing, ransomware, stryker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/virtual-machines-virtually-everywhere-and-with-real-security-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:38:01.182949+00:00</news:publication_date>
      <news:title>23% of Orgs Lack Cloud Visibility: VM Sprawl a Major Risk</news:title>
      <news:keywords>cloud security, cybersecurity threats, identity and access management, virtual machine vulnerabilities, virtual machines, vm sprawl</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-cvss-score/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:30:00.969059+00:00</news:publication_date>
      <news:title>What is CVSS Score?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:54.922161+00:00</news:publication_date>
      <news:title>What is a Supply Chain Attack?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-an-apt-advanced-persistent-threat/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:49.202164+00:00</news:publication_date>
      <news:title>What is an APT (Advanced Persistent Threat)?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-does-phishing-work/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:44.514377+00:00</news:publication_date>
      <news:title>How Does Phishing Work?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-penetration-testing/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:38.128478+00:00</news:publication_date>
      <news:title>What is Penetration Testing?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-cve/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:32.942591+00:00</news:publication_date>
      <news:title>What is a CVE?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-does-ransomware-work/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:27.771157+00:00</news:publication_date>
      <news:title>How Does Ransomware Work?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-zero-day-vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:21.337006+00:00</news:publication_date>
      <news:title>What is a Zero-Day Vulnerability?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/copy-paste-ransom-making-data-exfiltration-as-easy-as-azcopy/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:36:29.312176+00:00</news:publication_date>
      <news:title>Ransomware's New Trick: Stealing Data with Your Own Tools</news:title>
      <news:keywords>azcopy, azure storage, cloud security, cybersecurity, data exfiltration, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-you-need-to-know-about-salesforce-aurainspector-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:26:14.116902+00:00</news:publication_date>
      <news:title>Salesforce AuraInspector Attacks: Data Theft Shocker</news:title>
      <news:keywords>AuraInspector, cloud security, cybersecurity, data theft, misconfiguration, salesforce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/your-ai-assistant-is-an-attackers-favorite-recon-tool/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:27:18.449858+00:00</news:publication_date>
      <news:title>Your AI Assistant: The New, Silent Reconnaissance Squad for Hackers</news:title>
      <news:keywords>AI security, cyber attack, data breach, microsoft 365 copilot, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/varonis-launches-atlas-to-secure-ai-and-the-data-that-powers-it/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:21:42.198639+00:00</news:publication_date>
      <news:title>Varonis Thinks It Can Tame the AI Beast. Maybe.</news:title>
      <news:keywords>AI security, data security, enterprise ai, varonis atlas, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/varonis-discovers-local-file-inclusion-in-aws-remote-mcp-server-via-cli-shorthand-syntax/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:21:46.726501+00:00</news:publication_date>
      <news:title>AWS MCP Server's LFI Flaw: Authenticated Users Reading /etc/passwd via CLI Tricks</news:title>
      <news:keywords>AWS CLI security, AWS CLI shorthand, AWS MCP Server, AWS MCP vulnerability, AWS vulnerability, CLI security, CVE-2026-4270, LFI CVE, LFI CVE-2026-4270, MCP Server, Varonis Threat Labs, cloud security flaw</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-quiet-storm-infostealer-hijacks-sessions-decrypts-server-side/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:19:10.793714+00:00</news:publication_date>
      <news:title>Storm Infostealer: Your Browser Sessions Are Now for Sale, Undetected</news:title>
      <news:keywords>Storm malware, browser credential theft, credential theft, infostealer, server-side decryption, session hijacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/applying-zero-trust-to-mcp-in-ai-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:17:27.612219+00:00</news:publication_date>
      <news:title>Zero Trust for MCP: The AI Agent Security Fix Big Tech Ignores</news:title>
      <news:keywords>AI supply chain, MCP security, Model Context Protocol, Zero Trust AI, agentic AI, agentic AI risks, zero trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/varonis-recognized-as-a-leader-in-g2s-spring-2026-reports-including-new-data-security-posture-management-category/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:11:27.217076+00:00</news:publication_date>
      <news:title>Varonis Tops G2 Charts: Your Data's New AI Shield Just Got Smarter</news:title>
      <news:keywords>AI security, DSPM, G2 reports, UEBA, Varonis, data security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/whats-new-in-tenable-cloud-security-custom-policies-aws-abac-and-research-driven-protection/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:02:58.632896+00:00</news:publication_date>
      <news:title>Tenable's Cloud Security Tweaks: Real Fix or More Hype?</news:title>
      <news:keywords>AWS ABAC, Tenable Cloud Security, cloud vulnerabilities, custom policies</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/uncover-prompt-injection-insider-threats-with-the-tenable-one-model-refusal-detection/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T10:58:50.792072+00:00</news:publication_date>
      <news:title>Tenable's Model Refusal Detection: Turning AI 'No's into Cyber Shields</news:title>
      <news:keywords>AI security, Tenable One, insider threats, model refusal, model refusal detection, prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/adobe-patches-reader-zero-day-exploited-for-months/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T10:54:22.317198+00:00</news:publication_date>
      <news:title></news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/security-for-ai-a-guide-to-managing-the-risks-of-vibe-coding-and-ai-in-software-development/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T10:51:28.798185+00:00</news:publication_date>
      <news:title>81% of Developers Are Vibe Coding—And It's a Security Nightmare</news:title>
      <news:keywords>AI acceptable use policy, AI security risks, citizen developers, vibe coding</news:keywords>
    </news:news>
  </url>
</urlset>
