<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-01-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T07:00:02.041929+00:00</news:publication_date>
      <news:title>Daily Briefing: May 01, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/frontier-ai-reinforces-the-future-of-modern-cyber-defense/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T05:58:17.233758+00:00</news:publication_date>
      <news:title>AI Cyber Defense: Hype vs. Reality?</news:title>
      <news:keywords>OpenAI, SentinelOne, artificial intelligence, cyber defense, cybersecurity, frontier AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/snow-flurries-how-unc6692-employed-social-engineering-to-deploy-a-custom-malware-suite/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T05:49:46.087212+00:00</news:publication_date>
      <news:title>UNC6692 Malware Hijacks Teams, Turns Edge into Spy Tool</news:title>
      <news:keywords>autohotkey, browser extension, malware, microsoft teams, social engineering, unc6692</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-implementation-blind-spot-why-organizations-are-confusing-temporary-friction-with-permanent-safety/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T05:25:33.708782+00:00</news:publication_date>
      <news:title>AI Implementation Blind Spot: Why Friction Masks Risk [Analysis]</news:title>
      <news:keywords>AI adoption, AI implementation, cognitive rust belt, institutional knowledge, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/breaking-the-sound-barrier-part-ii-exploiting-cve-2024-54529/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:14:35.934122+00:00</news:publication_date>
      <news:title>macOS CoreAudio Exploit: Type Confusion Unpacked [Deep Dive]</news:title>
      <news:keywords>control flow hijacking, coreaudio, cve-2024-54529, exploit development, macos security, type confusion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/m-trends-2026-data-insights-and-strategies-from-the-frontlines/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:02:32.818082+00:00</news:publication_date>
      <news:title>M-Trends 2026: Dwell Time Jumps, Vishing Surges</news:title>
      <news:keywords>cyber threats, dwell time, m-trends 2026, mandiant, ransomware, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bypassing-administrator-protection-by-abusing-ui-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:03:32.086082+00:00</news:publication_date>
      <news:title>Windows UAC Bypass: 5 Flaws Found in UI Access</news:title>
      <news:keywords>Administrator Protection, security bypass, uac, ui access, vulnerability, windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-30-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T07:00:02.118185+00:00</news:publication_date>
      <news:title>Daily Briefing: April 30, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bypassing-windows-administrator-protection/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:58:57.322251+00:00</news:publication_date>
      <news:title>[9 Bypasses] Windows 11 Admin Protection Cracked</news:title>
      <news:keywords>Administrator Protection, UAC bypass, Windows 11, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/thinking-outside-the-box-dusted-off-draft-from-2017/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:45:30.440168+00:00</news:publication_date>
      <news:title>VirtualBox Slirp Heap Flaw Enables VM Escape [2017 CVE]</news:title>
      <news:keywords>CVE-2017-3558, Slirp exploit, VM escape, VirtualBox vulnerability, heap corruption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-proliferation-of-darksword-ios-exploit-chain-adopted-by-multiple-threat-actors/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:31:54.465396+00:00</news:publication_date>
      <news:title>[DarkSword] iOS Exploit Chain Used by Multiple Threat Actors</news:title>
      <news:keywords>DarkSword, Google TAG, Google Threat Intelligence, iOS exploit, iOS exploits, state-sponsored actors, threat actors, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-0-click-exploit-chain-for-the-pixel-9-part-1-decoding-dolby/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:18:09.229361+00:00</news:publication_date>
      <news:title>[Pixel 9 0-Click Exploit Chain] Dolby Decoder Cracked</news:title>
      <news:keywords>0-click attack, Android security, Dolby CVE, Pixel 9 exploit, Project Zero</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/sevii-launches-cyber-swarm-defense-to-make-agentic-ai-security-costs-predictable/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:09:51.286952+00:00</news:publication_date>
      <news:title>Sevii's Cyber Swarm Defense: Fixed-Price AI Security [2026 Launch]</news:title>
      <news:keywords>Sevii ADR, agentic AI security, cyber swarm defense, predictable AI costs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/alleged-chinese-state-hacker-extradited-to-us/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:52:04.121586+00:00</news:publication_date>
      <news:title>[Breaking] Chinese Silk Typhoon Hacker Extradited to US</news:title>
      <news:keywords>APT group, Chinese hackers, Microsoft Exchange hack, Silk Typhoon</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:03:02.010489+00:00</news:publication_date>
      <news:title>[84% Risk Spike] Secure Data Movement: Zero Trust's Silent Killer</news:title>
      <news:keywords>cross-domain solutions, cyber360 report, secure data movement, zero trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vect-ransomware-by-design-wiper-by-accident/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T13:52:42.729172+00:00</news:publication_date>
      <news:title>[VECT 2.0] Ransomware That Wipes Files Over 128KB</news:title>
      <news:keywords>Check Point Research, ESXi ransomware, VECT ransomware, ransomware flaw, wiper malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fake-reservation-links-prey-on-weary-travelers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:41:00.929066+00:00</news:publication_date>
      <news:title>Fake Travel Bookings Deliver Malware [TA558 Evolves]</news:title>
      <news:keywords>AsyncRAT, TA558, cybersecurity, malware, phishing, travel industry</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/robinhood-vulnerability-exploited-for-phishing-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T11:29:57.185867+00:00</news:publication_date>
      <news:title>Robinhood Phishing: How an Account Trick Led to Fake Logins</news:title>
      <news:keywords>account creation, email security, phishing, robinhood, social engineering, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T10:06:17.794874+00:00</news:publication_date>
      <news:title>LofyGang's Minecraft Return: From NPM Hacks to MaaS</news:title>
      <news:keywords>cybercrime, lfyestealer, lofygan, malware-as-a-service, minecraft, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cyber-insurance-data-gives-cisos-new-ammo-for-budget-talks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T09:06:47.300119+00:00</news:publication_date>
      <news:title>Cyber Insurance Data: CISOs' Secret Weapon for Budgets</news:title>
      <news:keywords>CISOs, MFA, budget talks, cyber insurance, ransomware, vulnerabilities</news:keywords>
    </news:news>
  </url>
</urlset>
