<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:40:54.688333+00:00</news:publication_date>
      <news:title>Claude Mythos Preview: Why Frontier AI Demands Endpoint Armor from CrowdStrike</news:title>
      <news:keywords>Anthropic AI, Claude Mythos Preview, CrowdStrike, Project Glasswing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:32:02.742862+00:00</news:publication_date>
      <news:title>$21 Billion Vanishes: FBI's Grim Cybercrime Tally for 2025</news:title>
      <news:keywords>AI scams, FBI IC3 report, cybercrime losses, investment scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:17:43.436172+00:00</news:publication_date>
      <news:title>Multi-OS Attacks Hit 65% of Breaches—SOCs' 3-Step Fix</news:title>
      <news:keywords>ANY.RUN Sandbox, ClickFix campaign, ClickFix malware, SOC workflows, any-run-sandbox, cross-platform triage, multi-OS cyberattacks, soc-triage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:14:54.671598+00:00</news:publication_date>
      <news:title>GPUBreach: How RowHammer Just Cracked Open NVIDIA's GPU Fortress</news:title>
      <news:keywords>GPU security, GPUBreach, NVIDIA vulnerability, RowHammer GPU, Rowhammer, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:10:53.185028+00:00</news:publication_date>
      <news:title>Syria's Hacked Government Accounts: A Digital Embarrassment That Could Spark Real Chaos</news:title>
      <news:keywords>MFA absence, MFA neglect, Syria hack, account takeover, cybersecurity failures, government X accounts, government account takeover, government accounts</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:10:30.181051+00:00</news:publication_date>
      <news:title>Hackers Weaponize Claude Code Leak with Infostealer Malware on GitHub</news:title>
      <news:keywords>AI coding security, AI tool hacks, Anthropic malware, Anthropic security, Claude Code leak, GitHub infostealer, GitHub malware, GitHub repos, GitHub takedowns, infostealer attack, infostealer malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:08:37.233864+00:00</news:publication_date>
      <news:title>Iran's Hackers Already Sabotaging US Power and Water Grids</news:title>
      <news:keywords>CyberAv3ngers, Iran hackers, PLC attacks, PLC sabotage, PLC vulnerabilities, US infrastructure, US infrastructure sabotage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:08:31.163308+00:00</news:publication_date>
      <news:title>Trent AI's $13M Gamble on Taming Wild AI Agents</news:title>
      <news:keywords>AI agent security, AI security platform, AI vulnerabilities, Trent AI, cybersecurity funding, cybersecurity startup, seed funding</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:06:54.246777+00:00</news:publication_date>
      <news:title>Hackers Hijack 1,000 ComfyUI Servers for a Stealthy Crypto Mining Empire</news:title>
      <news:keywords>Censys report, ComfyUI botnet, ComfyUI exploit, Stable Diffusion exploit, XMRig Monero, XMRig malware, cryptomining botnet, cryptomining campaign, custom node exploit, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:04:15.474453+00:00</news:publication_date>
      <news:title>Microsoft IPs Scan 287 Sneaky Web Shells: Attackers' Hit List Exposed</news:title>
      <news:keywords>Microsoft Azure, Microsoft Azure attacks, Microsoft Azure scans, WordPress attacks, WordPress vulnerabilities, persistence techniques, web shells, webshells</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:04:12.415984+00:00</news:publication_date>
      <news:title>North Korean Hackers Turn GitHub into a Shadowy C2 Nerve Center for South Korean Targets</news:title>
      <news:keywords>DPRK hackers, GitHub C2, Kimsuky, LNK phishing, South Korea attacks, South Korea cyberattacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:04:08.810712+00:00</news:publication_date>
      <news:title>North Korea's Six-Month Con Job Steals $285M from Solana DEX Drift</news:title>
      <news:keywords>DPRK cyber, DPRK hackers, Drift hack, Solana DeFi, crypto theft, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/grafana-patches-ai-bug-that-could-have-leaked-user-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:03:08.779026+00:00</news:publication_date>
      <news:title>Grafana's AI Feature Was One Sneaky Web Page Away from Spilling Secrets</news:title>
      <news:keywords>AI prompt injection, AI security patch, CVE-2024-9264, Grafana AI bug, Grafana vulnerability, data exfiltration, data leak, data leak vulnerability, observability security, prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:26.059531+00:00</news:publication_date>
      <news:title>Qilin and Warlock's BYOVD Assault: Silencing 300+ EDRs in the Kernel</news:title>
      <news:keywords>BYOVD, BYOVD attacks, EDR bypass, Qilin ransomware, Warlock ransomware, vulnerable drivers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-hidden-cost-of-recurring-credential-incidents/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:24.983512+00:00</news:publication_date>
      <news:title>Recurring Credential Incidents: The IT Time Sink Nobody Talks About</news:title>
      <news:keywords>breached passwords, helpdesk costs, password policies, password resets, password security, recurring credential incidents</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:07.548460+00:00</news:publication_date>
      <news:title>GrafanaGhost: The AI Backdoor Turning Data Dashboards into Spy Tools</news:title>
      <news:keywords>AI prompt injection, AI vulnerability, Grafana vulnerability, GrafanaGhost, data exfiltration, prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/storm-1175-exploits-flaws-in-high-velocity-medusa-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:06.783934+00:00</news:publication_date>
      <news:title>Storm-1175's 16-Vulnerability Blitz Powers Medusa Ransomware Onslaught</news:title>
      <news:keywords>Medusa ransomware, Microsoft threat intel, Storm-1175, healthcare ransomware, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/google-wants-to-transition-to-post-quantum-cryptography-by-2029/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:59:54.689583+00:00</news:publication_date>
      <news:title>Google's Rush to Post-Quantum Crypto by 2029: Prudent or Panic?</news:title>
      <news:keywords>Google security, crypto-agility, post-quantum cryptography, quantum computing threats, quantum threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:59:42.879062+00:00</news:publication_date>
      <news:title>Germany Names REvil and GandCrab Boss: Meet Daniil Shchukin</news:title>
      <news:keywords>Daniil Shchukin, GandCrab, Germany BKA, REvil, UNKN, double-extortion, ransomware, ransomware doxxing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/over-17bn-lost-to-cyber-fraud-in-the-last-year-warns-fbi/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:59:33.661232+00:00</news:publication_date>
      <news:title>FBI Tallies $17.7 Billion Cyber Fraud Haul: Crypto Kings, AI Deepfakes, and Your Wallet's Nightmare</news:title>
      <news:keywords>AI scams, AI-enabled fraud, FBI IC3 report, FBI Internet Crime Report, crypto investment scams, cryptocurrency fraud, cryptocurrency scams, cyber fraud, cyber fraud losses</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:58:23.988435+00:00</news:publication_date>
      <news:title>APT28's FrostArmada: How Russian Spies Hijacked 18,000 Routers for Stealthy Global Espionage</news:title>
      <news:keywords>APT28, DNS hijacking, FrostArmada, SOHO Routers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:56:24.816594+00:00</news:publication_date>
      <news:title>Docker's Sneaky Padding Trick: One Request Away from Host Takeover</news:title>
      <news:keywords>AI agent exploits, AuthZ bypass, Docker CVE-2026-34040, authorization bypass, container escape, container security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:55:37.704054+00:00</news:publication_date>
      <news:title>Germany Names REvil's Ringleaders: 130 Attacks, €35M in Pain – Justice or Just a Whack-a-Mole?</news:title>
      <news:keywords>BKA, BKA investigation, REvil, REvil ransomware, Russian hackers, cybercrime arrests, ransomware, ransomware attacks Germany</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:54:00.214124+00:00</news:publication_date>
      <news:title>Flowise's CVSS 10 RCE Nightmare: 12,000 Exposed AI Servers Under Siege</news:title>
      <news:keywords>AI security, CVE-2025-59528, Flowise, RCE exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:51:22.391042+00:00</news:publication_date>
      <news:title>Storm-1175's Zero-Day Rampage: China Hackers Dropping Medusa Ransomware in Record Time</news:title>
      <news:keywords>China threat actor, Medusa ransomware, Storm-1175, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/anthropic-teams-up-with-its-rivals-to-keep-ai-from-hacking-everything/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:51:17.492272+00:00</news:publication_date>
      <news:title>Anthropic's Project Glasswing: Rivals Unite Against AI's Hacking Edge</news:title>
      <news:keywords>AI cybersecurity, Anthropic AI, Anthropic Claude Mythos, Anthropic consortium, Claude Mythos, Project Glasswing, vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:50:13.824098+00:00</news:publication_date>
      <news:title>Storm-1175's Zero-Day Blitz: Ransomware Hits Where It Hurts Most</news:title>
      <news:keywords>Medusa ransomware, Microsoft threat intel, Microsoft threat intelligence, Storm-1175, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:49:27.868154+00:00</news:publication_date>
      <news:title>Claude Mythos Unearths Decade-Old Bugs — But Hands Hackers a Loaded Gun</news:title>
      <news:keywords>AI cybersecurity, Anthropic AI, Claude Mythos, Project Glasswing, agentic AI, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cybersecurity-in-the-age-of-instant-software/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:49:14.782523+00:00</news:publication_date>
      <news:title>Instant Software Upends Cybersecurity: Who Wins the AI Arms Race?</news:title>
      <news:keywords>AI arms race, AI cybersecurity, AI patching, auto-patching, instant software, vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:48:53.465151+00:00</news:publication_date>
      <news:title>LiteLLM's Poisoned PyPI Packages Turned Dev Laptops Into Open Credential Safes</news:title>
      <news:keywords>LiteLLM attack, PyPI malware, PyPI supply chain, credential theft, developer endpoint security, developer security, supply chain compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/critical-flowise-vulnerability-in-attacker-crosshairs/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:47:59.980491+00:00</news:publication_date>
      <news:title>Flowise's RCE Nightmare: 15,000 Exposed Servers in Hackers' Sights</news:title>
      <news:keywords>AI platform exploit, AI platform security, AI security, CVE-2025-59528, Flowise vulnerability, RCE exploit, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hong-kong-police-can-force-you-to-reveal-your-encryption-keys/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:47:49.590521+00:00</news:publication_date>
      <news:title>Hong Kong Cops Now Demand Your Phone Passcodes — Even at the Airport</news:title>
      <news:keywords>Hong Kong encryption keys, Hong Kong encryption law, device password demand, device seizures, device unlocking, national security law, police device seizure, privacy border seizure, privacy rights, privacy warning, privacy warning travelers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:46:34.671146+00:00</news:publication_date>
      <news:title>Iran's Hackers Spray Passwords at 300+ Israeli Microsoft 365 Targets—And It's Just Getting Started</news:title>
      <news:keywords>Gray Sandstorm, Iran cyber attacks, Iran cyber threats, Iran hackers, Iranian hackers, Microsoft 365 attacks, Microsoft 365 breach, Pay2Key ransomware, password spraying</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/automated-credential-harvesting-campaign-exploits-react2shell-flaw/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:45:45.520219+00:00</news:publication_date>
      <news:title>UAT-10608's Automated Credential Grab: Next.js Apps Bleeding Secrets via React2Shell</news:title>
      <news:keywords>Next.js vulnerability, React2Shell, React2Shell flaw, UAT-10608, credential harvesting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fortinet-issues-emergency-patch-for-forticlient-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:44:10.325086+00:00</news:publication_date>
      <news:title>Fortinet's FortiClient Zero-Day Lets Hackers Slip Past Logins—Patch or Perish</news:title>
      <news:keywords>CVE-2026-35616, FortiClient, FortiClient zero-day, Fortinet, authentication bypass, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:43:09.337889+00:00</news:publication_date>
      <news:title>RSAC 2026: AI's Cyber Arms Race Accelerates — But Who's Winning?</news:title>
      <news:keywords>AI cybersecurity, Kelly Jackson Higgins, RSA Conference, RSAC 2026, predictive security, security hype, threat detection, threat hunting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/ai-assisted-supply-chain-attack-targets-github/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:42:34.769099+00:00</news:publication_date>
      <news:title>PRT-Scan: AI Turns GitHub Misconfigs into Easy Supply Chain Prey</news:title>
      <news:keywords>AI malware, AI threats, ai-threat-actors, github-security, prt-scan, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploited/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:42:34.541890+00:00</news:publication_date>
      <news:title>Fortinet's FortiClient EMS Under Fire: Exploited Bugs Force Emergency Patches</news:title>
      <news:keywords>CVE-2026-35616, FortiClient EMS, Fortinet, SQL injection, zero-day exploit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/support-platform-breach-exposes-hims-amp-hers-customer-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:42:12.561828+00:00</news:publication_date>
      <news:title>Hims & Hers Breach Puts ED and Hair Loss Secrets in Hacker Hands</news:title>
      <news:keywords>Hims & Hers breach, ShinyHunters, Zendesk hack, telehealth data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/webinar-today-why-automated-pentesting-alone-is-not-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:41:40.569216+00:00</news:publication_date>
      <news:title>Your Pentest Bot Went Quiet: The Hidden Gaps Killing Your Security</news:title>
      <news:keywords>APT tools, automated pentesting, coverage gaps, penetration testing, pentesting tools, security validation, security webinar, validation framework</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/russian-apt28-hackers-hijack-routers-to-steal-credentials-uk-security-agency-warns/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:40:44.552747+00:00</news:publication_date>
      <news:title>APT28's Router Trap: How Russian Hackers Are Siphoning Your Secrets Through Everyday WiFi Gear</news:title>
      <news:keywords>APT28, DNS hijacking, DNS theft, Fancy Bear, NCSC advisory, credential theft, router hijacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:40:42.114899+00:00</news:publication_date>
      <news:title>36 Fake npm Strapi Plugins Slip Redis and Postgres Backdoors into Dev Pipelines</news:title>
      <news:keywords>PostgreSQL backdoor, Redis exploit, Redis exploitation, Strapi plugins, Strapi supply chain attack, malicious npm packages, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/understanding-current-threats-to-kubernetes-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:40:33.662818+00:00</news:publication_date>
      <news:title>Kubernetes Token Heists Spike 282%: Attackers' Fast Path to Your Cloud Core</news:title>
      <news:keywords>CVE-2025-55182, Kubernetes threats, React2Shell CVE, cloud pivoting, cloud pivots, service account tokens</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:40:31.462269+00:00</news:publication_date>
      <news:title>QR Codes Turn Traffic Texts into Data Heists</news:title>
      <news:keywords>QR code phishing, SMS scams, phishing texts, smishing attacks, smishing scams, traffic violation phishing, traffic violation scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:40:19.818187+00:00</news:publication_date>
      <news:title>Medusa Ransomware: Zero-Days to Encryption in Under 24 Hours</news:title>
      <news:keywords>Medusa ransomware, Storm-1175, double-extortion, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/axios-attack-shows-complex-social-engineering-is-industrialized/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:39:35.332119+00:00</news:publication_date>
      <news:title>Axios NPM Hijack: When Social Engineering Goes Factory-Scale</news:title>
      <news:keywords>axios-attack, npm security, social engineering, supply chain attack, supply chain attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:39:32.420764+00:00</news:publication_date>
      <news:title>FrostArmada's Fall: How Cops Crushed Russia's Router Spy Network Targeting Microsoft Logins</news:title>
      <news:keywords>APT28, DNS hijacking, FrostArmada, Microsoft 365 security, MikroTik routers, router compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:38:22.048326+00:00</news:publication_date>
      <news:title>CISA's Fortinet EMS Patch Deadline: A Wake-Up Call for Exposed Management Servers</news:title>
      <news:keywords>CISA KEV, CVE-2026-35616, Fortinet EMS, zero-day exploit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-week-in-security-march-30-8211-april-5/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:37:53.030202+00:00</news:publication_date>
      <news:title>Security's Wild Week: Fake Jobs, AI Chaos, and Supply Chain Scares</news:title>
      <news:keywords>AI bots, AI security risks, Apple patches, DarkSword malware, phishing scams, supply chain attacks, weekly security news</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:37:13.055381+00:00</news:publication_date>
      <news:title>North Korean Hackers Turn Axios NPM into Malware Machine: Supply Chain's New Frontline</news:title>
      <news:keywords>Axios npm hack, Chrome zero-day, Fortinet exploits, North Korea UNC1069, north-korea-cyber, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-your-automated-pentesting-tool-just-hit-a-wall/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:36:04.537804+00:00</news:publication_date>
      <news:title>The PoC Cliff: When Your Automated Pentesting Tool Runs Dry</news:title>
      <news:keywords>BAS vs Pentesting, Breach and Attack Simulation, PoC Cliff, automated pentesting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:35:23.021981+00:00</news:publication_date>
      <news:title>GPUBreach: Rowhammer's Sneaky GPU Path to Your Root Shell</news:title>
      <news:keywords>GPU Rowhammer, GPU vulnerability, GPUBreach, NVIDIA vulnerability, Rowhammer, Rowhammer attack, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:34:52.108718+00:00</news:publication_date>
      <news:title>AI Agents Are Turning Your Identity Gaps into Enterprise Nightmares</news:title>
      <news:keywords>AI security risks, IAM Zero Trust, Ponemon research, enterprise IAM, identity gaps</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/us-warns-of-iranian-hackers-targeting-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:32:51.246470+00:00</news:publication_date>
      <news:title>Iranian Hackers Are Back, Prodding U.S. PLCs in Water Plants and Power Grids</news:title>
      <news:keywords>CISA advisory, Iranian hackers, PLCs, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-mexicos-meta-ruling-and-encryption/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:32:20.013270+00:00</news:publication_date>
      <news:title>New Mexico's Meta Ruling Could Kill Encryption Dead</news:title>
      <news:keywords>New Mexico Meta ruling, Section 230, design liability, end-to-end encryption, platform safety, privacy liability, tech privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-simple-breach-monitoring-is-no-longer-enough/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:31:55.529566+00:00</news:publication_date>
      <news:title>Infostealers Nabbed 2.3 Billion Creds Last Year—Your Breach Alerts Missed Most</news:title>
      <news:keywords>breach monitoring, credential theft, infostealers, session cookies, session hijacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:31:46.293827+00:00</news:publication_date>
      <news:title>RSAC 2026: AI Agents Clash with Human CISOs</news:title>
      <news:keywords>AI cybersecurity, CISO debates, RSAC 2026, agentic AI, human vs AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/lies-damned-lies-and-cybersecurity-metrics/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:30:23.365030+00:00</news:publication_date>
      <news:title>C-Suite Execs Spill: Cybersecurity Metrics Are Mostly Smoke</news:title>
      <news:keywords>AI in cybersecurity, C-suite cyber, C-suite panel, CISO insights, KPI flaws, breach measurement, breach prevention, cybersecurity metrics, lagging indicators, security KPIs, security measurement flaws</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/severe-strongbox-vulnerability-patched-in-android/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:28:35.345642+00:00</news:publication_date>
      <news:title>Android's StrongBox Patch Fixes a Hidden Threat to Your Phone's Deepest Secrets</news:title>
      <news:keywords>Android StrongBox, Android security, Android security update, CVE-2025-48651, StrongBox vulnerability, hardware keystore, keystore patch, security patch</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:28:10.786461+00:00</news:publication_date>
      <news:title>GPUBreach: Rowhammer's GPU Assault Grabs Root in Seconds</news:title>
      <news:keywords>GPU Rowhammer, GPUBreach, IOMMU bypass, NVIDIA vulnerability, privilege escalation, system takeover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/shadow-ai-in-healthcare-is-here-to-stay/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:26:17.216367+00:00</news:publication_date>
      <news:title>Shadow AI Sneaks Into Hospitals: Docs Ditch Rules, Execs Scramble</news:title>
      <news:keywords>AI governance, AI risks, AI security, HIPAA risks, healthcare AI, healthcare security, hospital breaches, rogue AI tools, shadow AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-often-are-redirects-used-in-phishing-in-2026x3f-mon-apr-6th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:25:42.930898+00:00</news:publication_date>
      <news:title>Redirects Power 21% of Phishing Emails in Early 2026 – Why We're Still Sleeping on It</news:title>
      <news:keywords>Google redirect abuse, Google redirects, cyber threats 2026, email security, open redirects, phishing 2026, phishing campaigns, redirect phishing, threat actors</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/grafanaghost-exploit-bypasses-ai-guardrails-for-silent-data-exfiltration/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:25:01.418713+00:00</news:publication_date>
      <news:title>GrafanaGhost: The Zero-Click Data Heist No One Saw Coming</news:title>
      <news:keywords>AI guardrails, Grafana vulnerability, GrafanaGhost, data exfiltration, prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-new-rules-of-engagement-matching-agentic-attack-speed/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:24:59.018479+00:00</news:publication_date>
      <news:title>Machine-Speed Hackers Are Here: Your Network's Nightmare Just Got Autonomous</news:title>
      <news:keywords>AI cyberattacks, AI cyberwarfare, AI-enabled cyberattacks, Chinese hackers, agentic AI, agentic AI attacks, agentic attacks, agentic cyberattacks, hive mind defense, nation-state actors, nation-state threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:24:36.865953+00:00</news:publication_date>
      <news:title>Flowise's Perfect-10 RCE Flaw Goes Live: 15,000 Exposed Servers in the Crosshairs</news:title>
      <news:keywords>AI security, AI vulnerability, CVE-2025-59528, Flowise RCE, Flowise vulnerability, RCE exploit, code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:23:02.732432+00:00</news:publication_date>
      <news:title>GRU's Simple Router Trick Nabbed Microsoft Tokens from 18,000 Networks</news:title>
      <news:keywords>APT28, DNS hijacking, Forest Blizzard, GRU hackers, Russian GRU, Russian GRU hackers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:21:42.254952+00:00</news:publication_date>
      <news:title>North Koreans Schmoozed Their Way to $280M Drift Heist</news:title>
      <news:keywords>Drift Protocol hack, Lazarus Group, North Korean hackers, Solana security breach, crypto conference infiltration, crypto theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/focusing-on-the-people-in-cybersecurity-at-rsac-2026-conference/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:21:05.081320+00:00</news:publication_date>
      <news:title>RSAC 2026: AI's Big Show, Humans' Quiet Win</news:title>
      <news:keywords>AI cybersecurity, AI in cybersecurity, RSAC 2026, cybersecurity conference, human defenders, human element, human element security, human-centric security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/owasp-genai-security-project-gets-update-new-tools-matrix/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:20:03.807443+00:00</news:publication_date>
      <news:title>OWASP's GenAI Security Overhaul: 21 Risks, Tools Matrix, and the Cash Grab Behind It</news:title>
      <news:keywords>AI security risks, OWASP GenAI, agentic AI, tools matrix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/german-authorities-identify-revil-and-gandcrab-ransomware-bosses/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:09:38.305750+00:00</news:publication_date>
      <news:title>Germany Unmasks REvil and GandCrab Bosses: Russians Linked to $40M Ransoms</news:title>
      <news:keywords>BKA Germany, BKA arrest, BKA arrests, GandCrab, REvil ransomware, Russian cybercriminals, cybercrime Russia, cybercrime leaders, ransomware affiliates, ransomware leaders</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/shinyhunters-anodot-heist-dozens-of-snowflake-customers-drained-of-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:09:34.869988+00:00</news:publication_date>
      <news:title>ShinyHunters' Anodot Heist: Dozens of Snowflake Customers Drained of Data</news:title>
      <news:keywords>Anodot hack, ShinyHunters, Snowflake breach, token theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:06:43.801110+00:00</news:publication_date>
      <news:title>BlueHammer Drops: Rogue Researcher Dumps Windows Zero-Day Code After Microsoft Snub</news:title>
      <news:keywords>BlueHammer, BlueHammer exploit, MSRC disclosure, Microsoft MSRC, Windows zero-day, privilege escalation</news:keywords>
    </news:news>
  </url>
</urlset>
