<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/gmail-brings-end-to-end-encryption-to-android-and-ios-for-enterprise-users/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:07:24.899200+00:00</news:publication_date>
      <news:title>Gmail E2EE Hits Mobile: Enterprise Encryption Unlocked</news:title>
      <news:keywords>Gmail E2EE, Google Workspace, end-to-end encryption, enterprise security, mobile-encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:19:54.744146+00:00</news:publication_date>
      <news:title>[OpenAI Axios Hack] macOS Cert Revoked After North Korean Breach</news:title>
      <news:keywords>Axios supply chain attack, North Korean hackers, OpenAI breach, macOS certificate revocation, unc1069</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-week-in-security-april-6-8211-april-12/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T08:52:39.062283+00:00</news:publication_date>
      <news:title>[10 Threats] A Week in Security: Fake Claude Malware to Killer Robots</news:title>
      <news:keywords>data breaches, fake Claude malware, killer robots, router hacking, scam guard, security threats april 2024</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:39:39.648797+00:00</news:publication_date>
      <news:title>[Critical RCE] Marimo Flaw Exploited 10 Hours Post-Disclosure</news:title>
      <news:keywords>CVE-2026-39987, marimo-rce, python-notebook, remote code execution, sysdig</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-14-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:00:08.669265+00:00</news:publication_date>
      <news:title>Daily Briefing: April 14, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/mobile-app-permissions-still-matter-more-than-you-may-think/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:41:55.251448+00:00</news:publication_date>
      <news:title>Mobile App Permissions: Still Your Last Defense [5 Red Flags]</news:title>
      <news:keywords>AI app risks, Android permissions, app permissions, iOS privacy, mobile security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/promptspy-ushers-in-the-era-of-android-threats-using-genai/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:30:45.062824+00:00</news:publication_date>
      <news:title>[First] PromptSpy: Android Malware Hijacks Gemini AI</news:title>
      <news:keywords>Android malware, ESET research, Gemini AI abuse, Gemini abuse, PromptSpy, generative AI threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:19:34.765204+00:00</news:publication_date>
      <news:title>150+ Victims Hit in CPUID Breach [STX RAT Trojan]</news:title>
      <news:keywords>CPU-Z malware, CPU-Z trojan, CPUID breach, DLL side-loading, STX RAT, supply chain attack, watering hole attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-february-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T19:13:38.011548+00:00</news:publication_date>
      <news:title>[February 2026] AI Powers 600+ FortiGate Hacks & ATM Jackpots</news:title>
      <news:keywords>ATM jackpotting, FortiGate hacks, PromptSpy, cybersecurity February 2026, generative AI malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/protecting-education-how-mdr-can-tip-the-balance-in-favor-of-schools/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T18:15:24.056564+00:00</news:publication_date>
      <news:title>Ransomware on Schools Up 23% in 2025: MDR Hype or Help?</news:title>
      <news:keywords>MDR, education cybersecurity, nation-state threats, ransomware schools</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-smbs-use-threat-research-and-mdr-to-build-a-defensive-edge/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:53:01.353411+00:00</news:publication_date>
      <news:title>SMBs Cut Breach Risks 40% with MDR + Threat Intel [ESET Data]</news:title>
      <news:keywords>ESET, MDR, SMB cybersecurity, ransomware defense, threat research</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-cybersecurity-actually-does-for-your-business/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:56:31.126578+00:00</news:publication_date>
      <news:title>Cybersecurity ROI: Proving Value When Nothing Happens</news:title>
      <news:keywords>MDR, cybersecurity ROI, data breach cost, risk management, security budget</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cyber-fallout-from-the-iran-war-what-to-have-on-your-radar/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:49:14.124746+00:00</news:publication_date>
      <news:title>War in the Wires: Iran Attacks Cloud Data Centers</news:title>
      <news:keywords>Iran cyber attacks, cloud security, data center attacks, faketivism, nation-state threats, supply chain compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/sednit-reloaded-back-in-the-trenches/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:32:57.886149+00:00</news:publication_date>
      <news:title>Sednit Reloaded: Old Code, New Tricks [Ukraine]</news:title>
      <news:keywords>APT28, Fancy Bear, cyber espionage, malware, sednit, ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/face-value-what-it-takes-to-fool-facial-recognition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:27:31.043448+00:00</news:publication_date>
      <news:title>Facial Recognition Fools: Can You Trust Your Face?</news:title>
      <news:keywords>AI, biometric security, cybersecurity, facial recognition, identity verification, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edr-killers-explained-beyond-the-drivers/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:34:15.428130+00:00</news:publication_date>
      <news:title>EDR Killers: The $100M Problem Hackers Can't Ignore</news:title>
      <news:keywords>BYOVD, EDR killer, cybersecurity, malware analysis, ransomware, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/move-fast-and-save-things-a-quick-guide-to-recovering-a-hacked-account/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:04:28.582079+00:00</news:publication_date>
      <news:title>Hack Recovery: Act Fast or Lose It</news:title>
      <news:keywords>account recovery, cybersecurity, hacked accounts, malware, online security, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/rsac-2026-wrap-up-week-in-security-with-tony-anscombe/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:02:39.052353+00:00</news:publication_date>
      <news:title>RSAC 2026: AI Is Here. Are You?</news:title>
      <news:keywords>AI agents, AI security, RSAC 2026, cybersecurity risks, threat landscape</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cloud-workload-security-mind-the-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:22:31.549212+00:00</news:publication_date>
      <news:title>Cloud Security: The Messy Reality of Complexity</news:title>
      <news:keywords>Frankencloud, cloud visibility, cloud workload security, cybersecurity complexity, data breach costs, security automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-13-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:00:06.479304+00:00</news:publication_date>
      <news:title>Daily Briefing: April 13, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:51:42.899142+00:00</news:publication_date>
      <news:title>Cyber Breakout Time: 80% of RaaS Groups Use AI</news:title>
      <news:keywords>AI cybersecurity, MDR, RaaS, XDR, breakout time, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-march-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:46:28.442906+00:00</news:publication_date>
      <news:title>March Security: Hackers Hit Medtech, Data Theft Soars</news:title>
      <news:keywords>cybersecurity, data breach, encryption, phishing, ransomware, stryker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/virtual-machines-virtually-everywhere-and-with-real-security-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:38:01.182949+00:00</news:publication_date>
      <news:title>23% of Orgs Lack Cloud Visibility: VM Sprawl a Major Risk</news:title>
      <news:keywords>cloud security, cybersecurity threats, identity and access management, virtual machine vulnerabilities, virtual machines, vm sprawl</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-cvss-score/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:30:00.969059+00:00</news:publication_date>
      <news:title>What is CVSS Score?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:54.922161+00:00</news:publication_date>
      <news:title>What is a Supply Chain Attack?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-an-apt-advanced-persistent-threat/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:49.202164+00:00</news:publication_date>
      <news:title>What is an APT (Advanced Persistent Threat)?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-does-phishing-work/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:44.514377+00:00</news:publication_date>
      <news:title>How Does Phishing Work?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-penetration-testing/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:38.128478+00:00</news:publication_date>
      <news:title>What is Penetration Testing?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-cve/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:32.942591+00:00</news:publication_date>
      <news:title>What is a CVE?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-does-ransomware-work/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:27.771157+00:00</news:publication_date>
      <news:title>How Does Ransomware Work?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-is-a-zero-day-vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T16:29:21.337006+00:00</news:publication_date>
      <news:title>What is a Zero-Day Vulnerability?</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/copy-paste-ransom-making-data-exfiltration-as-easy-as-azcopy/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T15:36:29.312176+00:00</news:publication_date>
      <news:title>Ransomware's New Trick: Stealing Data with Your Own Tools</news:title>
      <news:keywords>azcopy, azure storage, cloud security, cybersecurity, data exfiltration, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-you-need-to-know-about-salesforce-aurainspector-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:26:14.116902+00:00</news:publication_date>
      <news:title>Salesforce AuraInspector Attacks: Data Theft Shocker</news:title>
      <news:keywords>AuraInspector, cloud security, cybersecurity, data theft, misconfiguration, salesforce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/your-ai-assistant-is-an-attackers-favorite-recon-tool/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:27:18.449858+00:00</news:publication_date>
      <news:title>Your AI Assistant: The New, Silent Reconnaissance Squad for Hackers</news:title>
      <news:keywords>AI security, cyber attack, data breach, microsoft 365 copilot, threat intelligence</news:keywords>
    </news:news>
  </url>
</urlset>
