<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/what-cybersecurity-actually-does-for-your-business/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:56:31.126578+00:00</news:publication_date>
      <news:title>Cybersecurity ROI: Proving Value When Nothing Happens</news:title>
      <news:keywords>MDR, cybersecurity ROI, data breach cost, risk management, security budget</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cyber-fallout-from-the-iran-war-what-to-have-on-your-radar/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:49:14.124746+00:00</news:publication_date>
      <news:title>War in the Wires: Iran Attacks Cloud Data Centers</news:title>
      <news:keywords>Iran cyber attacks, cloud security, data center attacks, faketivism, nation-state threats, supply chain compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/sednit-reloaded-back-in-the-trenches/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:32:57.886149+00:00</news:publication_date>
      <news:title>Sednit Reloaded: Old Code, New Tricks [Ukraine]</news:title>
      <news:keywords>APT28, Fancy Bear, cyber espionage, malware, sednit, ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/face-value-what-it-takes-to-fool-facial-recognition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:27:31.043448+00:00</news:publication_date>
      <news:title>Facial Recognition Fools: Can You Trust Your Face?</news:title>
      <news:keywords>AI, biometric security, cybersecurity, facial recognition, identity verification, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edr-killers-explained-beyond-the-drivers/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:34:15.428130+00:00</news:publication_date>
      <news:title>EDR Killers: The $100M Problem Hackers Can't Ignore</news:title>
      <news:keywords>BYOVD, EDR killer, cybersecurity, malware analysis, ransomware, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/move-fast-and-save-things-a-quick-guide-to-recovering-a-hacked-account/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:04:28.582079+00:00</news:publication_date>
      <news:title>Hack Recovery: Act Fast or Lose It</news:title>
      <news:keywords>account recovery, cybersecurity, hacked accounts, malware, online security, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/rsac-2026-wrap-up-week-in-security-with-tony-anscombe/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:02:39.052353+00:00</news:publication_date>
      <news:title>RSAC 2026: AI Is Here. Are You?</news:title>
      <news:keywords>AI agents, AI security, RSAC 2026, cybersecurity risks, threat landscape</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cloud-workload-security-mind-the-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:22:31.549212+00:00</news:publication_date>
      <news:title>Cloud Security: The Messy Reality of Complexity</news:title>
      <news:keywords>Frankencloud, cloud visibility, cloud workload security, cybersecurity complexity, data breach costs, security automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-13-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:00:06.479304+00:00</news:publication_date>
      <news:title>Daily Briefing: April 13, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:51:42.899142+00:00</news:publication_date>
      <news:title>Cyber Breakout Time: 80% of RaaS Groups Use AI</news:title>
      <news:keywords>AI cybersecurity, MDR, RaaS, XDR, breakout time, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-march-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:46:28.442906+00:00</news:publication_date>
      <news:title>March Security: Hackers Hit Medtech, Data Theft Soars</news:title>
      <news:keywords>cybersecurity, data breach, encryption, phishing, ransomware, stryker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/virtual-machines-virtually-everywhere-and-with-real-security-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:38:01.182949+00:00</news:publication_date>
      <news:title>23% of Orgs Lack Cloud Visibility: VM Sprawl a Major Risk</news:title>
      <news:keywords>cloud security, cybersecurity threats, identity and access management, virtual machine vulnerabilities, virtual machines, vm sprawl</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-cvss-score/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:30:00.969059+00:00</news:publication_date>
      <news:title>What is CVSS Score?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:54.922161+00:00</news:publication_date>
      <news:title>What is a Supply Chain Attack?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-an-apt-advanced-persistent-threat/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:49.202164+00:00</news:publication_date>
      <news:title>What is an APT (Advanced Persistent Threat)?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-does-phishing-work/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:44.514377+00:00</news:publication_date>
      <news:title>How Does Phishing Work?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-penetration-testing/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:38.128478+00:00</news:publication_date>
      <news:title>What is Penetration Testing?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-cve/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:32.942591+00:00</news:publication_date>
      <news:title>What is a CVE?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-does-ransomware-work/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:27.771157+00:00</news:publication_date>
      <news:title>How Does Ransomware Work?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-zero-day-vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:21.337006+00:00</news:publication_date>
      <news:title>What is a Zero-Day Vulnerability?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/copy-paste-ransom-making-data-exfiltration-as-easy-as-azcopy/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:36:29.312176+00:00</news:publication_date>
      <news:title>Ransomware's New Trick: Stealing Data with Your Own Tools</news:title>
      <news:keywords>azcopy, azure storage, cloud security, cybersecurity, data exfiltration, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-you-need-to-know-about-salesforce-aurainspector-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:26:14.116902+00:00</news:publication_date>
      <news:title>Salesforce AuraInspector Attacks: Data Theft Shocker</news:title>
      <news:keywords>AuraInspector, cloud security, cybersecurity, data theft, misconfiguration, salesforce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/your-ai-assistant-is-an-attackers-favorite-recon-tool/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:27:18.449858+00:00</news:publication_date>
      <news:title>Your AI Assistant: The New, Silent Reconnaissance Squad for Hackers</news:title>
      <news:keywords>AI security, cyber attack, data breach, microsoft 365 copilot, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/varonis-launches-atlas-to-secure-ai-and-the-data-that-powers-it/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T12:21:42.198639+00:00</news:publication_date>
      <news:title>Varonis Thinks It Can Tame the AI Beast. Maybe.</news:title>
      <news:keywords>AI security, data security, enterprise ai, varonis atlas, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/varonis-discovers-local-file-inclusion-in-aws-remote-mcp-server-via-cli-shorthand-syntax/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:21:46.726501+00:00</news:publication_date>
      <news:title>AWS MCP Server's LFI Flaw: Authenticated Users Reading /etc/passwd via CLI Tricks</news:title>
      <news:keywords>AWS CLI security, AWS CLI shorthand, AWS MCP Server, AWS MCP vulnerability, AWS vulnerability, CLI security, CVE-2026-4270, LFI CVE, LFI CVE-2026-4270, MCP Server, Varonis Threat Labs, cloud security flaw</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-quiet-storm-infostealer-hijacks-sessions-decrypts-server-side/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:19:10.793714+00:00</news:publication_date>
      <news:title>Storm Infostealer: Your Browser Sessions Are Now for Sale, Undetected</news:title>
      <news:keywords>Storm malware, browser credential theft, credential theft, infostealer, server-side decryption, session hijacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/applying-zero-trust-to-mcp-in-ai-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:17:27.612219+00:00</news:publication_date>
      <news:title>Zero Trust for MCP: The AI Agent Security Fix Big Tech Ignores</news:title>
      <news:keywords>AI supply chain, MCP security, Model Context Protocol, Zero Trust AI, agentic AI, agentic AI risks, zero trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/varonis-recognized-as-a-leader-in-g2s-spring-2026-reports-including-new-data-security-posture-management-category/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:11:27.217076+00:00</news:publication_date>
      <news:title>Varonis Tops G2 Charts: Your Data's New AI Shield Just Got Smarter</news:title>
      <news:keywords>AI security, DSPM, G2 reports, UEBA, Varonis, data security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/whats-new-in-tenable-cloud-security-custom-policies-aws-abac-and-research-driven-protection/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T11:02:58.632896+00:00</news:publication_date>
      <news:title>Tenable's Cloud Security Tweaks: Real Fix or More Hype?</news:title>
      <news:keywords>AWS ABAC, Tenable Cloud Security, cloud vulnerabilities, custom policies</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/uncover-prompt-injection-insider-threats-with-the-tenable-one-model-refusal-detection/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T10:58:50.792072+00:00</news:publication_date>
      <news:title>Tenable's Model Refusal Detection: Turning AI 'No's into Cyber Shields</news:title>
      <news:keywords>AI security, Tenable One, insider threats, model refusal, model refusal detection, prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/adobe-patches-reader-zero-day-exploited-for-months/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T10:54:22.317198+00:00</news:publication_date>
      <news:title></news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/security-for-ai-a-guide-to-managing-the-risks-of-vibe-coding-and-ai-in-software-development/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T10:51:28.798185+00:00</news:publication_date>
      <news:title>81% of Developers Are Vibe Coding—And It's a Security Nightmare</news:title>
      <news:keywords>AI acceptable use policy, AI security risks, citizen developers, vibe coding</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-15/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T17:08:19.399244+00:00</news:publication_date>
      <news:title>FBI Wipes Russian Spy Routers Clean as Iran Hammers U.S. Factory Controls</news:title>
      <news:keywords>APT28, GRU router hijack, Iranian OT attacks, macOS ClickFix bypass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edge-decay-how-a-failing-perimeter-is-fueling-modern-intrusions/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T17:07:53.005485+00:00</news:publication_date>
      <news:title>Edge Decay: Attackers Are Breaching Your 'Secure' Firewall First</news:title>
      <news:keywords>edge decay, network intrusions, perimeter security, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-laughing-rat-crystalx-combines-spyware-stealer-and-prankware-features/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T17:01:05.950912+00:00</news:publication_date>
      <news:title>CrystalX RAT: The Malware That Trolls You While Pilfering Your Secrets</news:title>
      <news:keywords>CrystalX RAT, RAT malware, RAT trojan, Telegram malware, credential stealer, malware-as-a-service, prankware, stealer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/metasploit-wrap-up-03202026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:57:03.614341+00:00</news:publication_date>
      <news:title>Metasploit's March 2026 Punch: FreePBX and AVideo Ripe for Ransack</news:title>
      <news:keywords>AVideo Encoder, AVideo Encoder CVE, AVideo Encoder RCE, CVE-2026-29058, FreePBX, FreePBX exploit, Metasploit, Metasploit update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-soc-files-time-to-sapecar-unpacking-a-new-horabot-campaign-in-mexico/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:54:47.443401+00:00</news:publication_date>
      <news:title>Horabot's 'Sapecar' Strikes Mexico: Old Tricks, New CAPTCHA Lies</news:title>
      <news:keywords>Horabot, Mexico malware, Sapecar campaign, banking trojan, malware Mexico</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/from-vectors-to-verdicts-web-app-testing-with-vector-command/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:54:32.271318+00:00</news:publication_date>
      <news:title>Vector Command Turns Web Apps into Breach Blueprints</news:title>
      <news:keywords>Rapid7, Vector Command, red team testing, red teaming, web app security, web app testing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:53:49.205776+00:00</news:publication_date>
      <news:title>ClipBanker's Marathon Infection: From Proxifier Search to Crypto Heist</news:title>
      <news:keywords>ClipBanker, GitHub malware, Proxifier trojan, crypto stealer, fileless malware, malware infection chain</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-whitepaper-exploiting-cellular-based-iot-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:53:05.112231+00:00</news:publication_date>
      <news:title>Rapid7 Cracks Open Cellular IoT: No Tamper Protections on Any Tested Device</news:title>
      <news:keywords>AT commands, AT commands hacking, IoT exploits, IoT security risks, Rapid7 whitepaper, cellular IoT, cellular IoT exploits, physical access attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-first-look-at-our-speaker-lineup-and-agenda-for-the-rapid7-2026-global-cybersecurity-summit/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:48:06.211433+00:00</news:publication_date>
      <news:title>Rapid7's 2026 Summit: Preemptive Security or Just More Buzz?</news:title>
      <news:keywords>MDR Services, Rapid7 Summit, SOC Operations, cybersecurity conference, preemptive security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/negotiating-with-the-board-translating-active-risk-into-financial-exposure/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:47:53.885673+00:00</news:publication_date>
      <news:title>Boardroom Battle: Swap Vuln Counts for Dollar Risks Before It's Too Late</news:title>
      <news:keywords>Active Risk, FAIR model, InsightVM, board reporting, cybersecurity financial risk, financial exposure, financial risk, vulnerability prioritization</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/free-real-estate-gopix-the-banking-trojan-living-off-your-memory/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:43:23.934098+00:00</news:publication_date>
      <news:title>GoPix: Brazil's Sneaky Banking Trojan That Hides in Plain RAM</news:title>
      <news:keywords>Brazil malware, GoPix, banking trojan, malvertising, memory malware, memory-only malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/whats-new-in-rapid7-products-and-services-q1-2026-in-review/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:43:22.637609+00:00</news:publication_date>
      <news:title>Rapid7's Q1 Power Play: 94% Faster Probes from a Surprise Acquisition</news:title>
      <news:keywords>AI SecOps, AI security, Kenzo acquisition, MDR, MDR Microsoft, Rapid7, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/exploits-and-vulnerabilities-in-q4-2025/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:41:36.770281+00:00</news:publication_date>
      <news:title>Q4 2025: Vulnerabilities Explode, Exploits Feast</news:title>
      <news:keywords>CVE exploits, Linux kernel CVEs, Linux kernel exploits, Linux kernel flaws, Q4 2025 vulnerabilities, WinRAR CVE, WinRAR exploits, Windows Office flaws, Windows exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/an-ai-gateway-designed-to-steal-your-data/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:40:48.330275+00:00</news:publication_date>
      <news:title>LiteLLM's Poisoned Update: Hackers Hijack AI Gateway to Raid Cloud Secrets</news:title>
      <news:keywords>AI gateway malware, AI gateway security, AI security breach, LiteLLM attack, LiteLLM hack, PyPI malware, PyPI supply chain attack, cloud secret theft, supply chain compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-cisos-should-expect-from-ai-powered-mdr-in-2026-according-to-rapid7-ceo-corey-thomas/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:40:39.613551+00:00</news:publication_date>
      <news:title>Rapid7 CEO: AI MDR Will Force CISOs to Ditch Reactive Alerts by 2026</news:title>
      <news:keywords>AI MDR, AI-powered MDR, CISO 2026, Corey Thomas, Rapid7, preemptive security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-threat-to-critical-infrastructure-has-changed-has-your-readiness/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:40:26.915750+00:00</news:publication_date>
      <news:title>Critical Infrastructure's Hidden Weakness: Legacy Systems vs. 2026 Threats</news:title>
      <news:keywords>Microsoft threat intelligence, NIS2 Directive, critical infrastructure, cyber readiness, cybersecurity regulations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/you-dont-have-a-security-problem-you-have-a-visibility-problem/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:39:18.120129+00:00</news:publication_date>
      <news:title>Blind Spots Are Breaching Your Defenses—Not Zero-Days</news:title>
      <news:keywords>asset inventory, asset visibility, attack paths, cybersecurity breaches, cybersecurity visibility, identity exposure, visibility problem</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/anatomy-of-a-cyber-world-global-report-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:37:09.233152+00:00</news:publication_date>
      <news:title>Kaspersky's 2026 Report: Big Attacks Down, But Hackers Love Your Trusted Partners Now</news:title>
      <news:keywords>Kaspersky report, Kaspersky report 2026, LOLBins, MDR Services, MDR alerts, MDR telemetry, cyber attack trends, cyberattack trends 2025, incident response stats, incident response trends, trusted relationships attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/red-teaming-in-2026-what-to-expect-at-our-2026-global-cybersecurity-summit/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:36:52.801544+00:00</news:publication_date>
      <news:title>Red Teaming's Quiet Revolution: 2026's Shift to Continuous Security Feedback</news:title>
      <news:keywords>MDR operations, Rapid7, Rapid7 Summit, continuous threat defense, cybersecurity operations, cybersecurity summit, red teaming, threat validation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/inside-an-aienabled-device-code-phishing-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:35:49.739409+00:00</news:publication_date>
      <news:title>AI-Driven Device Code Phishing Scales Up Attacks on Corporate Logins</news:title>
      <news:keywords>AI phishing, EvilTokens, Microsoft 365 security, device code phishing, microsoft-defender</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/aurainspector-auditing-salesforce-aura-for-data-exposure/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:33:57.561854+00:00</news:publication_date>
      <news:title>Mandiant's AuraInspector Reveals Salesforce's Sneaky Data Leaks — And How to Plug Them</news:title>
      <news:keywords>AuraInspector, Mandiant, Salesforce Aura, data exposure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bpfdoor-in-telecom-networks-sleeper-cells-in-the-backbone/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:33:55.037663+00:00</news:publication_date>
      <news:title>BPFdoor: Stealth Backdoors Buried Deep in Global Telecom Arteries</news:title>
      <news:keywords>BPFDoor, China APT, Red Menshen, kernel implant, kernel malware, telecom backdoor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/intent-redirection-vulnerability-in-third-party-sdk-exposed-millions-of-android-wallets-to-potential-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:33:30.038772+00:00</news:publication_date>
      <news:title>Sloppy Android SDK Nearly Drains 30M Crypto Wallets</news:title>
      <news:keywords>Android security, Android vulnerability, crypto wallet risk, crypto wallet security, crypto-wallets, engagesdk, intent redirection, intent redirection vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cookie-controlled-php-webshells-a-stealthy-tradecraft-in-linux-hosting-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:31:49.844925+00:00</news:publication_date>
      <news:title>Cookies Unlocked: How Hackers Weaponize HTTP Cookies for Stealthy PHP Webshells</news:title>
      <news:keywords>Linux hosting security, Linux server security, PHP webshells, cookie obfuscation, cookie-controlled attacks, webshell evasion, webshell obfuscation, webshell tradecraft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-agentic-socrethinking-secops-for-the-next-decade/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:30:24.937474+00:00</news:publication_date>
      <news:title>Agentic SOC: Security's Shiny New Buzzword?</news:title>
      <news:keywords>AI security, AI security agents, SecOps, agentic SOC, autonomous defense</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:29:27.596827+00:00</news:publication_date>
      <news:title>WinRAR's CVE-2025-8088 Draws Russian, Chinese Hackers Long After Patch</news:title>
      <news:keywords>CVE-2025-8088, China APT, Russia threat actors, WinRAR vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:28:55.183021+00:00</news:publication_date>
      <news:title>North Korea's UNC1069 Pulls Off Crypto Heist with Deepfake Zoom and Seven Malware Strains</news:title>
      <news:keywords>AI deepfakes, AI deepfakes malware, North Korea hacking, North Korea malware, crypto hacks, cryptocurrency attacks, malware social engineering, unc1069</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/closing-the-door-on-net-ntlmv1-releasing-rainbow-tables-to-accelerate-protocol-deprecation/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:28:21.122764+00:00</news:publication_date>
      <news:title>Mandiant's Rainbow Tables Bury Net-NTLMv1 for Good</news:title>
      <news:keywords>Mandiant, Net-NTLMv1, authentication coercion, rainbow tables</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/exposing-the-undercurrent-disrupting-the-gridtide-global-cyber-espionage-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:28:02.018015+00:00</news:publication_date>
      <news:title>Google and Mandiant Torch GRIDTIDE: Shutting Down China's Sneaky Global Spy Net</news:title>
      <news:keywords>China espionage, GRIDTIDE, Google Mandiant disruption, Google Threat Intelligence, UNC2814, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:27:56.591193+00:00</news:publication_date>
      <news:title>Storm-2755's Payroll Pirate Raid: Canadian Paychecks Hijacked Mid-Session</news:title>
      <news:keywords>AiTM, AiTM phishing, Canadian cybersecurity, MFA bypass, SEO poisoning, Storm-2755, payroll attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/metasploit-wrap-up-03272026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:27:34.963951+00:00</news:publication_date>
      <news:title>Metasploit's March 2026 Update Arms Attackers Against Printers, Dev Spaces, and Email Gateways</news:title>
      <news:keywords>Barracuda ESG, CVE-2026-23767, Eclipse Che RCE, Metasploit, NTLM Relay, exploit modules, penetration testing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-whitepaper-stealthy-bpfdoor-variants-are-a-needle-that-looks-like-hay/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:27:03.284576+00:00</news:publication_date>
      <news:title>BPFDoor's Sneaky Upgrade: Seven New Variants Dodge Defenses in Telecom Backbones</news:title>
      <news:keywords>BPFDoor, BPFDoor variants, Rapid7 research, kernel backdoor, telecom malware, telecom threats, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2026-3055-citrix-netscaler-adc-and-netscaler-gateway-out-of-bounds-read/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:26:25.401247+00:00</news:publication_date>
      <news:title>CVE-2026-3055: Citrix NetScaler's SAML Memory Leak Goes Wild, Echoing CitrixBleed Nightmare</news:title>
      <news:keywords>CVE-2026-3055, Citrix NetScaler, SAML vulnerability, memory leak, memory leak exploit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/initial-access-brokers-have-shifted-to-high-value-targets-and-premium-pricing/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:26:17.840271+00:00</news:publication_date>
      <news:title>Initial Access Brokers Ditch Small Fry for Fat Corporate Wallets</news:title>
      <news:keywords>DarkForums, IABs, RAMP, RDP access, cybercrime forums, initial access brokers, ransomware access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/gtig-ai-threat-tracker-distillation-experimentation-and-continued-integration-of-ai-for-adversarial-use/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:24:22.143801+00:00</news:publication_date>
      <news:title>Cloning Google's AI: How Hackers Steal Frontier Models to Supercharge Attacks</news:title>
      <news:keywords>AI misuse, GTIG AI Threat Tracker, distillation attacks, model extraction</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/threat-actor-abuse-of-ai-accelerates-from-tool-to-cyberattack-surface/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:23:05.441128+00:00</news:publication_date>
      <news:title>AI: From Cybercriminal Sidekick to Attack Factory Floor</news:title>
      <news:keywords>AI cyberattacks, AI cybersecurity threats, MFA bypass, Storm-1747, Tycoon2FA, phishing AI, phishing AI abuse</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-project-glasswing-means-for-security-leaders/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:22:50.546169+00:00</news:publication_date>
      <news:title>Anthropic's Project Glasswing Just Unleashed a Vulnerability Monster</news:title>
      <news:keywords>AI security, AI vulnerability discovery, Anthropic Claude, Anthropic Claude Mythos, Claude Mythos, Project Glasswing, security remediation, vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/financial-cyberthreats-in-2025-and-the-outlook-for-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:21:27.544734+00:00</news:publication_date>
      <news:title>Infostealers Hijack Your Wallet: Financial Cyberthreats Evolving Faster Than Your Bank's Security</news:title>
      <news:keywords>banking malware, dark web fraud, financial cyberthreats, financial phishing, infostealers, phishing 2025</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/coruna-the-framework-used-in-operation-triangulation/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:21:23.155024+00:00</news:publication_date>
      <news:title>Coruna: How a Reusable iOS Exploit Framework Ties Back to Russia's Operation Triangulation</news:title>
      <news:keywords>Coruna framework, Operation Triangulation, iOS exploits, iOS zero-days, iPhone exploits, kernel exploits, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
</urlset>
