<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/cyber-insurance-guide-what-businesses-need-to-know-about-coverage/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.173297+00:00</news:publication_date>
      <news:title>Cyber Insurance Guide: What Businesses Need to Know About Coverage</news:title>
      <news:keywords>business continuity, cyber insurance, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/soc-analyst-career-guide-skills-certifications-and-career-path/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.163670+00:00</news:publication_date>
      <news:title>SOC Analyst Career Guide: Skills, Certifications, and Career Path</news:title>
      <news:keywords>SOC analyst, certifications, cybersecurity careers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/threat-intelligence-platforms-how-to-operationalize-threat-data/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.155494+00:00</news:publication_date>
      <news:title>Threat Intelligence Platforms: How to Operationalize Threat Data</news:title>
      <news:keywords>TIP, cyber threat intelligence, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/nation-state-cyber-threats-apt-groups-tactics-and-defense-strategies/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.147770+00:00</news:publication_date>
      <news:title>Nation-State Cyber Threats: APT Groups, Tactics, and Defense Strategies</news:title>
      <news:keywords>APT groups, cyber espionage, nation-state threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/data-loss-prevention-dlp-solutions-and-implementation-guide/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.139315+00:00</news:publication_date>
      <news:title>Data Loss Prevention: DLP Solutions and Implementation Guide</news:title>
      <news:keywords>DLP, data loss prevention, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/network-segmentation-strategies-for-enterprise-security/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.129413+00:00</news:publication_date>
      <news:title>Network Segmentation Strategies for Enterprise Security</news:title>
      <news:keywords>micro-segmentation, network segmentation, zero trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vulnerability-management-lifecycle-from-discovery-to-remediation/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.120136+00:00</news:publication_date>
      <news:title>Vulnerability Management Lifecycle: From Discovery to Remediation</news:title>
      <news:keywords>patching, risk assessment, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/security-compliance-frameworks-compared-soc-2-iso-27001-and-hipaa/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.111799+00:00</news:publication_date>
      <news:title>Security Compliance Frameworks Compared: SOC 2, ISO 27001, and HIPAA</news:title>
      <news:keywords>HIPAA, ISO 27001, SOC 2</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/endpoint-detection-and-response-how-edr-protects-organizations/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.103908+00:00</news:publication_date>
      <news:title>Endpoint Detection and Response: How EDR Protects Organizations</news:title>
      <news:keywords>EDR, endpoint security, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/identity-and-access-management-a-comprehensive-iam-guide/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.094251+00:00</news:publication_date>
      <news:title>Identity and Access Management: A Comprehensive IAM Guide</news:title>
      <news:keywords>IAM, access control, multi-factor authentication</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-anatomy-of-a-data-breach-how-breaches-happen-and-lessons-learned/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.086257+00:00</news:publication_date>
      <news:title>The Anatomy of a Data Breach: How Breaches Happen and Lessons Learned</news:title>
      <news:keywords>data breach, risk management, threat analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/supply-chain-attacks-how-they-work-and-how-to-defend-against-them/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.077550+00:00</news:publication_date>
      <news:title>Supply Chain Attacks: How They Work and How to Defend Against Them</news:title>
      <news:keywords>software security, supply chain, vendor risk</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/penetration-testing-methodology-a-complete-guide-for-security-teams/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.067411+00:00</news:publication_date>
      <news:title>Penetration Testing Methodology: A Complete Guide for Security Teams</news:title>
      <news:keywords>penetration testing, red team, vulnerability assessment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cloud-security-best-practices-for-aws-azure-and-google-cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.058285+00:00</news:publication_date>
      <news:title>Cloud Security Best Practices for AWS, Azure, and Google Cloud</news:title>
      <news:keywords>AWS, Azure, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/phishing-attacks-explained-types-examples-and-how-to-prevent-them/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.051922+00:00</news:publication_date>
      <news:title>Phishing Attacks Explained: Types, Examples, and How to Prevent Them</news:title>
      <news:keywords>email security, phishing, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/incident-response-planning-a-step-by-step-guide-for-organizations/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.044115+00:00</news:publication_date>
      <news:title>Incident Response Planning: A Step-by-Step Guide for Organizations</news:title>
      <news:keywords>compliance, incident response, security operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/siem-vs-soar-vs-xdr-choosing-the-right-security-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.037286+00:00</news:publication_date>
      <news:title>SIEM vs SOAR vs XDR: Choosing the Right Security Platform</news:title>
      <news:keywords>SIEM, SOAR, XDR</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-ransomware-works-attack-lifecycle-and-prevention-strategies/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.030368+00:00</news:publication_date>
      <news:title>How Ransomware Works: Attack Lifecycle and Prevention Strategies</news:title>
      <news:keywords>data recovery, incident response, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/owasp-top-10-a-complete-guide-to-web-application-security-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.022236+00:00</news:publication_date>
      <news:title>OWASP Top 10: A Complete Guide to Web Application Security Risks</news:title>
      <news:keywords>OWASP, application security, web security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/zero-trust-architecture-explained-principles-implementation-and-benefits/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:56:03.007431+00:00</news:publication_date>
      <news:title>Zero Trust Architecture Explained: Principles, Implementation, and Benefits</news:title>
      <news:keywords>identity management, network security, zero trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/regular-password-resets-arent-as-safe-as-you-think/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:01:20.088879+00:00</news:publication_date>
      <news:title>The $70 Helpdesk Ticket: How Password Resets Became the Front Door for Hackers</news:title>
      <news:keywords>M&S breach, helpdesk security, multi-factor authentication bypass, password reset vulnerability, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:18:53.337334+00:00</news:publication_date>
      <news:title>[CVE-2026-3844] Hackers Hit Breeze Cache in 170+ Attacks</news:title>
      <news:keywords>Breeze Cache, WordPress exploit, WordPress vulnerability, Wordfence, breeze-cache-vulnerability, cve-2026-3844, file upload exploit, file-upload-rce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:26.135570+00:00</news:publication_date>
      <news:title>[Trigona Ransomware] Custom Exfiltration Tool Speeds Up Data Theft</news:title>
      <news:keywords>custom-malware, data exfiltration, ransomware-tactics, symantec-report, trigona-ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/mozilla-anthropics-mythos-found-271-security-vulnerabilities-in-firefox-150/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:54:06.439843+00:00</news:publication_date>
      <news:title>[271 Firefox Bugs] Anthropic's Mythos Crushes Security Testing</news:title>
      <news:keywords>AI security testing, Anthropic Mythos, Firefox vulnerabilities, Mozilla Firefox 150</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:51:58.642192+00:00</news:publication_date>
      <news:title>[2026] Checkmarx KICS Supply-Chain Hack Steals Secrets in 84 Minutes</news:title>
      <news:keywords>Checkmarx KICS, Checkmarx breach, Docker compromise, Docker malware, KICS supply-chain attack, VSCode extension malware, VSCode-malware, credential theft, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:50:43.501674+00:00</news:publication_date>
      <news:title>[2026] Bitwarden CLI npm Compromised in Supply Chain Attack</news:title>
      <news:keywords>Checkmarx breach, TeamPCP, bitwarden-cli-npm-compromise, bitwarden-compromise, credential theft, developer-credentials-stolen, npm supply chain attack, supply chain attack, teampcp-malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cosmetics-giant-rituals-discloses-data-breach-affecting-customers/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:41:38.751575+00:00</news:publication_date>
      <news:title>Rituals Data Breach: 41M Loyalty Members at Risk</news:title>
      <news:keywords>My Rituals, My Rituals hack, Rituals breach, Rituals data breach, consumer-pii-theft, customer data leak, customer data theft, data leak, loyalty-program-hack, phishing risks, retail cybersecurity</news:keywords>
    </news:news>
  </url>
</urlset>
