<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/meet-bluekit-the-ai-powered-all-in-one-phishing-kit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:54:17.353460+00:00</news:publication_date>
      <news:title>Phishing Kit Ditches Old Ways for AI [Bluekit Analysis]</news:title>
      <news:keywords>AI in cybersecurity, Bluekit, cybercrime tools, phishing kits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:50:07.782775+00:00</news:publication_date>
      <news:title>CISA Flags Exploited ConnectWise, Windows Bugs</news:title>
      <news:keywords>CISA, CVE-2024-1708, ConnectWise ScreenConnect, KEV, Known Exploited Vulnerabilities, Microsoft Windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-to-watch-this-week-zero-trusts-blind-spots-and-ais-evolving-menace-20260503/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:00:05.060763+00:00</news:publication_date>
      <news:title>What to Watch This Week: Zero Trust's Blind Spots and AI's Evolving Menace</news:title>
      <news:keywords>AI, analysis, cybersecurity, predictions, ransomware, trends</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/story-retracted/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T07:43:56.215672+00:00</news:publication_date>
      <news:title>Exploit Chain Unleashed: Zero-Days Cascade</news:title>
      <news:keywords>cybersecurity, exploit chain, sandbox bypass, threat intelligence, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-03-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T07:00:01.958223+00:00</news:publication_date>
      <news:title>Daily Briefing: May 03, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/five-things-we-took-away-from-gartner-srm-sydney-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T06:36:40.400043+00:00</news:publication_date>
      <news:title>Gartner Sydney: Security Budgets Shift to Resilience, Not Just 'Breach or Else'</news:title>
      <news:keywords>SecOps, business resilience, cybersecurity budgets, gartner, platform consolidation, srm sydney</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/experts-on-experts-the-2026-threat-landscape-is-moving-faster-than-defenders-expect/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:33:31.747920+00:00</news:publication_date>
      <news:title>2026 Threat Landscape: Attackers Faster Than Defenders</news:title>
      <news:keywords>2026 threat landscape, AI in cybersecurity, MFA, cybersecurity, threat acceleration, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:30:47.196737+00:00</news:publication_date>
      <news:title>Criminal IP & ThreatQ: Merging IP Intel for Faster Investigations</news:title>
      <news:keywords>Criminal IP, IP reputation, Securonix, ThreatQ, cybersecurity, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2026-41940-cpanel-whm-authentication-bypass/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:15:45.332836+00:00</news:publication_date>
      <news:title>cPanel Auth Bypass: 9.8 CVSS Flaw Exploited</news:title>
      <news:keywords>CVE-2026-41940, WHM, authentication bypass, cPanel, web hosting, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-success-illusion-how-cross-tenant-ropc-can-gaslight-your-soc-and-poison-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T19:17:56.732571+00:00</news:publication_date>
      <news:title>[Warning] 'Ghost Logins' Fool SIEMs, Tax SOC Teams</news:title>
      <news:keywords>SIEM, UEBA, azure ad, entra id, ropc, security logs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T18:11:32.869754+00:00</news:publication_date>
      <news:title>China Hackers Hit Asia Govts, NATO, Journalists [New Campaign]</news:title>
      <news:keywords>GLITTER CARP, SEQUIN CARP, SHADOW-EARTH-053, Trend Micro, china-linked hackers, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/if-ais-so-smart-why-does-it-keep-deleting-production-databases/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T16:39:16.336442+00:00</news:publication_date>
      <news:title>AI Deleting Data? It's Not AI, It's Bad Testing. [Analysis]</news:title>
      <news:keywords>AI agents, AI security, data loss, production databases, security testing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T16:11:14.579868+00:00</news:publication_date>
      <news:title>SaaS Extortion: Vishing & SSO Abuse Fueling Rapid Cyberattacks</news:title>
      <news:keywords>SSO abuse, SaaS security, cybercrime, data extortion, identity provider, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:01:38.030408+00:00</news:publication_date>
      <news:title>ConsentFix v3 Hits Azure: What It Means for You</news:title>
      <news:keywords>Azure, MFA bypass, account takeover, consentfix v3, cybersecurity, oauth</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edtech-firm-instructure-confirms-data-breach-after-salesforce-instance-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:48:28.446308+00:00</news:publication_date>
      <news:title>Instructure Suffers Salesforce Hack, Edtech Sector Under Fire</news:title>
      <news:keywords>ShinyHunters, data breach, edtech, instructure, salesforce, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-bluekit-phishing-kit-features-ai-assistant/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T12:07:46.783755+00:00</news:publication_date>
      <news:title>Bluekit Phishing Kit Adds AI Assistant, Threatens Real People</news:title>
      <news:keywords>AI, Bluekit, Varonis, cybersecurity, malware, phishing kit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/disneyland-now-uses-face-recognition-on-visitors/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:08:32.972508+00:00</news:publication_date>
      <news:title>Disney's New Face Tech: Creepy Surveillance or Convenient Entry?</news:title>
      <news:keywords>AI, NSA, biometric data, disneyland, face recognition, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/15-year-old-detained-over-french-govt-agency-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T10:14:23.515753+00:00</news:publication_date>
      <news:title>15-Year-Old Held in Massive French Gov Agency Data Breach</news:title>
      <news:keywords>ants, cybercrime, data breach, france titres, personal data, teen hacker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/metasploit-wrap-up-05012026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:47:57.766136+00:00</news:publication_date>
      <news:title>Metasploit 2026: AI Sees Your Exploits, New Linux LPE Lands</news:title>
      <news:keywords>Linux vulnerability, Metasploit, ai integration, copy fail, cve-2026-31431, local privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-02-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T07:00:01.996975+00:00</news:publication_date>
      <news:title>Daily Briefing: May 02, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/essential-data-sources-for-detection-beyond-the-endpoint/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:56:35.177748+00:00</news:publication_date>
      <news:title>Beyond the Endpoint: Are We Safe?</news:title>
      <news:keywords>SOC, Unit 42, attack surface, cloud security, data exfiltration, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation-across-cloud-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:56:21.050610+00:00</news:publication_date>
      <news:title>Linux Root Exploit: Millions of Cloud Servers at Risk [CVE-2026-31431]</news:title>
      <news:keywords>CISA KEV, cloud security, cve-2026-31431, linux kernel, microsoft-defender, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/tune-in-the-future-of-ai-powered-vulnerability-discovery/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:55:18.762714+00:00</news:publication_date>
      <news:title>AI's Vuln-Pocalypse: Are Defenders Ready?</news:title>
      <news:keywords>AI in cybersecurity, CrowdStrike, threat intelligence, vuln-pocalypse, vulnerability discovery, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/76-of-all-crypto-stolen-in-2026-is-now-in-north-korea/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:47:26.344971+00:00</news:publication_date>
      <news:title>[2026] North Korea Crypto Thefts Hit 76% of Total Stolen</news:title>
      <news:keywords>AI, Lazarus Group, blockchain, cryptocurrency, cybercrime, north korea</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/dangerous-new-linux-exploit-gives-attackers-root-access-to-countless-computers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:41:41.292605+00:00</news:publication_date>
      <news:title>Linux Root Exploit: Attackers Gain Unfettered Access</news:title>
      <news:keywords>copyfail, cve-2026-31431, linux exploit, linux security, privilege escalation, root access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T19:29:50.824487+00:00</news:publication_date>
      <news:title>30,000 Facebook Accounts Hacked: Google AppSheet Abuse Exposed</news:title>
      <news:keywords>account compromise, accountdumpling, cybercrime, facebook phishing, google appsheet, telegram</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-18/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T18:14:31.843273+00:00</news:publication_date>
      <news:title>AI Unleashed: The Week of Digital Empires and Devastating Hacks</news:title>
      <news:keywords>SAP, crypto fraud, cyberespionage, npm packages, social media scams, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/mastering-agentic-ai-security-through-exposure-management/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:57:32.469062+00:00</news:publication_date>
      <news:title>AI Agents: The New Cyber Frontier</news:title>
      <news:keywords>AI security, agentic AI, autonomous ai, cyber risk, exposure management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/copy-fail-cve-2026-31431-frequently-asked-questions-about-linux-kernel-privilege-escalation-vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:56:47.299602+00:00</news:publication_date>
      <news:title>Copy Fail: Linux Kernel Root Exploit Targets 7 Years of Code</news:title>
      <news:keywords>copy fail, cve-2026-31431, linux kernel, privilege escalation, root access, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/actively-exploited-cpanel-bug-exposes-millions-of-websites-to-takeover/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:54:18.564785+00:00</news:publication_date>
      <news:title>cPanel Exploit: Millions of Sites Vulnerable to Takeover [Urgent Update]</news:title>
      <news:keywords>CVE-2026-41940, WHM, authentication bypass, cPanel, vulnerability, website takeover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/8-best-practices-for-cisos-conducting-risk-reviews/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:53:21.941092+00:00</news:publication_date>
      <news:title>[Microsoft CISO] 8 Risk Review Best Practices</news:title>
      <news:keywords>CISO best practices, cybersecurity strategy, microsoft-security, risk reviews</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/anti-ddos-firm-heaped-attacks-on-brazilian-isps/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:43:49.666903+00:00</news:publication_date>
      <news:title>DDoS Firm Accused of Launching Attacks It Should Prevent</news:title>
      <news:keywords>botnet, brazil, ddos, huge networks, isp, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-april-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:36:13.895144+00:00</news:publication_date>
      <news:title>AI's Silent Takeover: Security Shake-Up in April 2026</news:title>
      <news:keywords>AI security, Iranian hackers, Rockwell PLCs, critical infrastructure, cybercrime statistics, helpdesk scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bridging-the-gap-how-to-integrate-claude-security-into-the-tenable-one-exposure-management-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:32:19.967774+00:00</news:publication_date>
      <news:title>Claude Security Joins Tenable One: Is AI Vulnerability Noise Finally Contained?</news:title>
      <news:keywords>AI in Security, Claude Security, Code Security, Tenable One, exposure management, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-stole-hundreds-of-thousands-of-roblox-accounts-heres-what-to-do/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:28:03.626186+00:00</news:publication_date>
      <news:title>Roblox Hackers Stole 610K Accounts in $225K Scheme</news:title>
      <news:keywords>account theft, cybercrime, cybersecurity, data breach, infostealer, infostealer malware, malware, roblox</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/whats-new-updated-or-recently-released-in-microsoft-security/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:25:51.177877+00:00</news:publication_date>
      <news:title>Microsoft Rolls Out AI Agent Security Tools [Agent 365]</news:title>
      <news:keywords>AI security, agent 365, github advanced security, microsoft purview, microsoft-defender, microsoft-security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/nsa-chief-during-snowden-affair-shares-regrets-reflections-13-years-later/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:25:10.139091+00:00</news:publication_date>
      <news:title>NSA Snowden Leaks: Ex-Chief's 13-Year Regrets</news:title>
      <news:keywords>Chris Inglis, NSA, Snowden, intelligence, privacy, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-quarter-of-healthcare-organizations-report-medical-device-cyber-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:24:41.894237+00:00</news:publication_date>
      <news:title>Medical Device Cyber-Attacks: 1 in 4 Healthcare Firms Hit</news:title>
      <news:keywords>ai in healthcare, cybersecurity risks, healthcare cyber attacks, legacy equipment, medical device cybersecurity, runsafe security</news:keywords>
    </news:news>
  </url>
</urlset>
