<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-29-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:00:08.952066+00:00</news:publication_date>
      <news:title>Daily Briefing: April 29, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-mythos-moment-enterprises-must-fight-agents-with-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:32:09.508594+00:00</news:publication_date>
      <news:title>Anthropic's 'Mythos' AI Threat: Defense Demands Agents</news:title>
      <news:keywords>AI threats, Anthropic, Mythos AI, agentic AI, cybersecurity, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vect-20-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:31:18.275769+00:00</news:publication_date>
      <news:title>VECT 2.0: The Ransomware That Just Destroys, Not Encrypts</news:title>
      <news:keywords>cybersecurity, data wiper, esxi security, malware analysis, ransomware, vect 2.0</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vimeo-confirms-user-and-customer-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:29:25.961818+00:00</news:publication_date>
      <news:title>Vimeo Data Breach: Third-Party Vendor Exposed User Info</news:title>
      <news:keywords>ShinyHunters, anodot, cybersecurity, data breach, third-party risk, vimeo</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/get-motivated-what-to-expect-from-our-keynote-at-rapid7s-global-cybersecurity-summit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:23:44.074479+00:00</news:publication_date>
      <news:title>Rapid7 Keynote: Special Forces Mindset for Cyber Ops?</news:title>
      <news:keywords>Rapid7, cybersecurity summit, incident response, jason fox, keynote, security operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/simplifying-aws-defense-with-microsoft-sentinel-ueba/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:21:35.810931+00:00</news:publication_date>
      <news:title>Microsoft Sentinel UEBA: AWS Defense Gets Smarter</news:title>
      <news:keywords>UEBA, aws security, cloudtrail, microsoft sentinel, security analytics, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vidar-rises-to-top-of-chaotic-infostealer-market/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:12:11.263388+00:00</news:publication_date>
      <news:title>[Vidar] Infostealer Kingpin Emerges From Market Chaos</news:title>
      <news:keywords>infostealer, lumma, malware, rhadamanthys, vidar</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:04:56.718819+00:00</news:publication_date>
      <news:title>GitHub Exploit: Your Code's New Security Nightmare?</news:title>
      <news:keywords>cloud security, command injection, cve-2026-3854, git push, github, rce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/feuding-ransomware-groups-leak-each-others-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:02:45.911329+00:00</news:publication_date>
      <news:title>Rival Ransomware Gangs Turn on Each Other: Data Dumped</news:title>
      <news:keywords>0APT, KryBit, cyber threat intelligence, data breach, data leak, malware, ransomware, ransomware groups</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:46:06.559218+00:00</news:publication_date>
      <news:title>LiteLLM SQLi Flaw: Hackers Strike API Keys</news:title>
      <news:keywords>API keys, CVE-2026-42208, LLM security, LiteLLM, SQL injection, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:37:38.496003+00:00</news:publication_date>
      <news:title>Code Cowboys: 73 Fake VS Code Extensions Hijacked by GlassWorm v2</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/video-service-vimeo-confirms-anodot-breach-exposed-user-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:36:19.088595+00:00</news:publication_date>
      <news:title>Vimeo Breach: Who Really Holds the Keys?</news:title>
      <news:keywords>ShinyHunters, anodot, cybersecurity, data breach, data exposure, vimeo</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:32:02.737125+00:00</news:publication_date>
      <news:title>PhantomCore's TrueConf Exploits Expose Russian Networks: A Deep Dive into the Attack Chain</news:title>
      <news:keywords>cybersecurity, hacktivism, phantomcore, russia, trueconf, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/us-launches-sweeping-crackdown-on-southeast-asia-cyberscams-and-sanctions-cambodian-senator/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:28:49.408941+00:00</news:publication_date>
      <news:title>Uncle Sam Goes Ghostbusters on Southeast Asian Scammers: Is It Enough?</news:title>
      <news:keywords>Southeast Asia, cambodia, crackdown, cyberscam, human trafficking, organized crime, sanctions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/unc6692-uses-email-bombing-social-engineering-to-deploy-snow-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:20:30.934452+00:00</news:publication_date>
      <news:title>Snow Job: How UNC6692 uses Email Floods and Fake IT Support to Plant Its 'Snow' Malware</news:title>
      <news:keywords>APT, cloud security, email bombing, malware analysis, snow malware, social engineering, unc6692</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/energy-and-water-management-firm-itron-hacked/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:17:47.609076+00:00</news:publication_date>
      <news:title>Itron's Systems Breach: The Chill on Critical Infrastructure</news:title>
      <news:keywords>Itron, critical infrastructure, cybersecurity, data breach, utility management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/weekly-recap-fast16-malware-xchat-launch-federal-backdoor-ai-employee-tracking-more/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:13:05.622249+00:00</news:publication_date>
      <news:title>AI Tracking & Backdoors: 2026's Digital Wild West</news:title>
      <news:keywords>AI employee tracking, FIRESTARTER backdoor, Lotus Wiper, SystemBC, fast16 malware, unc6692</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/unpatched-phantomrpc-flaw-in-windows-enables-privilege-escalation/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:10:34.115622+00:00</news:publication_date>
      <news:title>Windows PhantomRPC: 5 Attack Paths Exposed</news:title>
      <news:keywords>PhantomRPC, Windows RPC, cybersecurity vulnerability, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/glassworm-malware-attacks-return-via-73-openvsx-sleeper-extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:03:46.837658+00:00</news:publication_date>
      <news:title>GlassWorm's New Trick: OpenVSX Extensions Now 'Sleep' Before Attacking</news:title>
      <news:keywords>GlassWorm, OpenVSX, developer security, malware, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/robinhood-account-creation-flaw-abused-to-send-phishing-emails/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:57:09.604470+00:00</news:publication_date>
      <news:title>Robinhood Account Flaw Fuels Phishing Frenzy</news:title>
      <news:keywords>account creation flaw, data breach, email security, phishing, robinhood</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/utilities-tech-supplier-itron-discloses-cyber-attack-operations-unaffected/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:31:51.384291+00:00</news:publication_date>
      <news:title>Itron Hacked, But Ops Unscathed [Cyber Breach Report]</news:title>
      <news:keywords>Itron, cybersecurity breach, incident response, it systems, operational resilience, utilities sector</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/most-cybersecurity-professionals-feel-undervalued-and-underpaid/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T13:04:23.718364+00:00</news:publication_date>
      <news:title>[Cybersecurity Crisis] Most Feel Undervalued, Underpaid</news:title>
      <news:keywords>Harvey Nash report, cybersecurity, cybersecurity professionals, job satisfaction, pay gap, talent retention</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/easily-exploitable-pack2theroot-linux-vulnerability-leads-to-root-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T10:34:59.675214+00:00</news:publication_date>
      <news:title>Linux Root Access? 'Pack2TheRoot' Flaw Exposed</news:title>
      <news:keywords>CVE-2026-41651, Linux vulnerability, Pack2TheRoot, PackageKit, root access exploit</news:keywords>
    </news:news>
  </url>
</urlset>
