<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/in-other-news-train-hacker-arrested-pamdoora-linux-backdoor-new-cisa-director-frontrunner/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T18:24:16.888820+00:00</news:publication_date>
      <news:title>CISA Eyes 3-Day Patch Cycle | North Korea's Gaming & ATM Schemes</news:title>
      <news:keywords>AI in cybersecurity, ATM jackpotting, CISA, linux malware, north korea, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T18:09:33.669387+00:00</news:publication_date>
      <news:title>NVIDIA GeForce NOW Breach: Armenian Users Exposed</news:title>
      <news:keywords>armenia, cloud gaming, cybersecurity, data breach, geforce now, nvidia</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/shifting-budget-dynamics-for-identity-security-and-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T15:48:17.565797+00:00</news:publication_date>
      <news:title>AI Agent Budgets: Identity Security's Next Frontier [Omdia Data]</news:title>
      <news:keywords>AI agent security, AI agents, IAM, Omdia, Omdia research, budget dynamics, budgeting, cybersecurity, identity-security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fake-openai-repository-on-hugging-face-pushes-infostealer-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T14:43:33.310204+00:00</news:publication_date>
      <news:title>AI's Dark Side: Hugging Face Repo Pushed Infostealer</news:title>
      <news:keywords>AI security, OpenAI, cybersecurity, hugging face, infostealer, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/shinyhunters-claims-second-attack-against-instructure/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T13:20:12.748867+00:00</news:publication_date>
      <news:title>Instructure Hack: Millions of Records at Risk. Again.</news:title>
      <news:keywords>ShinyHunters, canvas, cybersecurity, data breach, instructure, pii</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fake-call-history-apps-stole-payments-from-users-after-73-million-play-store-downloads/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:29:54.398676+00:00</news:publication_date>
      <news:title>Fake Call History Apps: Millions Downloaded, Users Ripped Off</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/zara-data-breach-exposed-personal-information-of-197000-people/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T11:12:54.462441+00:00</news:publication_date>
      <news:title>Zara Data Breach: 197K Emails Exposed</news:title>
      <news:keywords>BigQuery, Inditex, ShinyHunters, Zara, customer data, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackable-robot-lawn-mower-unlocks-a-new-nightmare/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T10:00:13.814487+00:00</news:publication_date>
      <news:title>Your Robot Lawn Mower Wants Your Wi-Fi Password. Should You Care?</news:title>
      <news:keywords>Gemini Nano Chrome, Meta Instagram encryption, Yarbo vulnerabilities, privacy concerns, robot lawn mower hack, smart home security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T09:15:43.693011+00:00</news:publication_date>
      <news:title>cPanel Patches Critical Vulns</news:title>
      <news:keywords>CVE-2026-29201, CVE-2026-29202, CVE-2026-29203, WHM, cPanel, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/dirty-frag-cve-2026-43284-cve-2026-43500-frequently-asked-questions-about-this-linux-kernel-privilege-escalation-vulnerability-chain/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T08:15:58.945138+00:00</news:publication_date>
      <news:title>Linux Kernel Exploit 'Dirty Frag' Uncovered</news:title>
      <news:keywords>copy fail, cve-2026-43284, cve-2026-43500, dirty frag, linux kernel exploit, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-09-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:00:02.161375+00:00</news:publication_date>
      <news:title>Daily Briefing: May 09, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T06:45:39.230103+00:00</news:publication_date>
      <news:title>TCLBANKER: AI's Banking Trojan Debut?</news:title>
      <news:keywords>WhatsApp malware, banking trojan, cybersecurity, malware analysis, outlook malware, tclbanker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/friday-squid-blogging-giant-squid-live-in-the-waters-of-western-australia/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T05:46:14.194018+00:00</news:publication_date>
      <news:title>Giant Squid DNA Found in Ocean [2026]</news:title>
      <news:keywords>Architeuthis dux, Western Australia, eDNA, environmental DNA, giant squid, marine biology</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/metasploit-wrap-up-05082026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T05:22:53.587857+00:00</news:publication_date>
      <news:title>Metasploit 2026: Beyond Exploits, Into the Data</news:title>
      <news:keywords>Metasploit, data integration, exploit development, ftp scanner, penetration testing, vulnerability scanning</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T05:18:48.537776+00:00</news:publication_date>
      <news:title>Linux Kernel's Dirty Frag: Root Access Via Networking Flaws?</news:title>
      <news:keywords>cve, dirty frag, esp4, kernel vulnerability, linux, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/canvas-attackers-compromise-275m-students-teachers-and-staff/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:04:52.086124+00:00</news:publication_date>
      <news:title>Canvas Breach: 275M Students Exposed. It's Not Just Tech.</news:title>
      <news:keywords>ShinyHunters, canvas, data breach, edtech, instructure, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:35:58.831508+00:00</news:publication_date>
      <news:title>[Water Crisis] Polish Security Agency Reports ICS Breaches</news:title>
      <news:keywords>APT28, ICS, OT, Poland, cyberattack, water treatment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-the-approaching-flood-of-vulnerabilities-changes-everything-and-what-to-do-about-it/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:29:22.434283+00:00</news:publication_date>
      <news:title>AI Creates CVE Flood: NVD Retreat Wrecks Patching</news:title>
      <news:keywords>AI cybersecurity, cve, cybersecurity threats, nist, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:29:00.260909+00:00</news:publication_date>
      <news:title>Linux PamDOORa Backdoor Emerges: Stealing SSH Creds</news:title>
      <news:keywords>Linux backdoor, PAM modules, authentication, backdoor, cybercrime, cybersecurity, linux, malware, pamdoora, pluggable authentication modules, ssh credentials</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-more-analysts-wont-solve-your-socs-alert-problem/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:27:57.732464+00:00</news:publication_date>
      <news:title>AI in SOC: Analysts Won't Solve Alert Overload</news:title>
      <news:keywords>AI in Security, SOC, alert fatigue, cybersecurity, incident response, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/another-universal-linux-local-privilege-escalation-lpe-vulnerability-dirty-frag-fri-may-8th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:27:44.683869+00:00</news:publication_date>
      <news:title>Dirty Frag LPE: Linux Kernel Vulnerability Strikes Again [Analysis]</news:title>
      <news:keywords>dirty frag, kernel exploit, linux kernel, local privilege escalation, lpe, security vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:20:25.358738+00:00</news:publication_date>
      <news:title>RCE in xrdp: How a Simple String Conversion Opened the Door</news:title>
      <news:keywords>CVE-2025-68670, Kaspersky, RDP, linux security, rce, remote code execution, remote desktop, xrdp</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:16:50.539644+00:00</news:publication_date>
      <news:title>Ivanti Zero-Day: Feds Scramble as CISA Issues 4-Day Patch Mandate</news:title>
      <news:keywords>CISA, CVE-2026-6973, cybersecurity, epmm, federal agencies, ivanti, ivanti epmm, vulnerability, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:16:32.028570+00:00</news:publication_date>
      <news:title>[Data] 1% of Alerts Hide a Missed Breach Weekly</news:title>
      <news:keywords>EDR, cloud security, enterprise security, low-severity threats, phishing, security alerts</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/trellix-source-code-breach-claimed-by-ransomhouse-hackers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:15:02.997064+00:00</news:publication_date>
      <news:title>Trellix Source Code Breach: RansomHouse Claims Attack</news:title>
      <news:keywords>cybersecurity, data extortion, ransomhouse, source code breach, trellix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:12:11.683546+00:00</news:publication_date>
      <news:title>Braintrust API Keys Compromised in AWS Breach</news:title>
      <news:keywords>AI, API keys, AWS, braintrust, cloud security, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/zero-chaos-scaling-detection-engineering-at-the-speed-of-software-with-detection-as-code/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:11:21.916521+00:00</news:publication_date>
      <news:title>Security Detections: From Chaos to Code [Rapid7's Approach]</news:title>
      <news:keywords>AI in Security, Rapid7, SIEM, ci/cd, detection as code, detection engineering, devsecops, infrastructure as code, security operations, terraform, threat hunting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/voidstealer-malware-darts-past-google-chromes-encryption/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:00:34.818181+00:00</news:publication_date>
      <news:title>VoidStealer Exploits Chrome Encryption [New Threat]</news:title>
      <news:keywords>Google Chrome, app-bound encryption, cybersecurity, infostealer, malware, voidstealer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-19/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:58:37.267138+00:00</news:publication_date>
      <news:title>Cybercrime Court Victories, Evolving Worms & Zero-Days</news:title>
      
    </news:news>
  </url>
</urlset>
