<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/bypassing-administrator-protection-by-abusing-ui-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:03:32.086082+00:00</news:publication_date>
      <news:title>Windows UAC Bypass: 5 Flaws Found in UI Access</news:title>
      <news:keywords>Administrator Protection, security bypass, uac, ui access, vulnerability, windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-30-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T07:00:02.118185+00:00</news:publication_date>
      <news:title>Daily Briefing: April 30, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bypassing-windows-administrator-protection/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:58:57.322251+00:00</news:publication_date>
      <news:title>[9 Bypasses] Windows 11 Admin Protection Cracked</news:title>
      <news:keywords>Administrator Protection, UAC bypass, Windows 11, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/thinking-outside-the-box-dusted-off-draft-from-2017/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:45:30.440168+00:00</news:publication_date>
      <news:title>VirtualBox Slirp Heap Flaw Enables VM Escape [2017 CVE]</news:title>
      <news:keywords>CVE-2017-3558, Slirp exploit, VM escape, VirtualBox vulnerability, heap corruption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-proliferation-of-darksword-ios-exploit-chain-adopted-by-multiple-threat-actors/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:31:54.465396+00:00</news:publication_date>
      <news:title>[DarkSword] iOS Exploit Chain Used by Multiple Threat Actors</news:title>
      <news:keywords>DarkSword, Google TAG, Google Threat Intelligence, iOS exploit, iOS exploits, state-sponsored actors, threat actors, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-0-click-exploit-chain-for-the-pixel-9-part-1-decoding-dolby/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:18:09.229361+00:00</news:publication_date>
      <news:title>[Pixel 9 0-Click Exploit Chain] Dolby Decoder Cracked</news:title>
      <news:keywords>0-click attack, Android security, Dolby CVE, Pixel 9 exploit, Project Zero</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/sevii-launches-cyber-swarm-defense-to-make-agentic-ai-security-costs-predictable/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:09:51.286952+00:00</news:publication_date>
      <news:title>Sevii's Cyber Swarm Defense: Fixed-Price AI Security [2026 Launch]</news:title>
      <news:keywords>Sevii ADR, agentic AI security, cyber swarm defense, predictable AI costs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/alleged-chinese-state-hacker-extradited-to-us/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:52:04.121586+00:00</news:publication_date>
      <news:title>[Breaking] Chinese Silk Typhoon Hacker Extradited to US</news:title>
      <news:keywords>APT group, Chinese hackers, Microsoft Exchange hack, Silk Typhoon</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:03:02.010489+00:00</news:publication_date>
      <news:title>[84% Risk Spike] Secure Data Movement: Zero Trust's Silent Killer</news:title>
      <news:keywords>cross-domain solutions, cyber360 report, secure data movement, zero trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vect-ransomware-by-design-wiper-by-accident/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T13:52:42.729172+00:00</news:publication_date>
      <news:title>[VECT 2.0] Ransomware That Wipes Files Over 128KB</news:title>
      <news:keywords>Check Point Research, ESXi ransomware, VECT ransomware, ransomware flaw, wiper malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fake-reservation-links-prey-on-weary-travelers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:41:00.929066+00:00</news:publication_date>
      <news:title>Fake Travel Bookings Deliver Malware [TA558 Evolves]</news:title>
      <news:keywords>AsyncRAT, TA558, cybersecurity, malware, phishing, travel industry</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/robinhood-vulnerability-exploited-for-phishing-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T11:29:57.185867+00:00</news:publication_date>
      <news:title>Robinhood Phishing: How an Account Trick Led to Fake Logins</news:title>
      <news:keywords>account creation, email security, phishing, robinhood, social engineering, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T10:06:17.794874+00:00</news:publication_date>
      <news:title>LofyGang's Minecraft Return: From NPM Hacks to MaaS</news:title>
      <news:keywords>cybercrime, lfyestealer, lofygan, malware-as-a-service, minecraft, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cyber-insurance-data-gives-cisos-new-ammo-for-budget-talks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T09:06:47.300119+00:00</news:publication_date>
      <news:title>Cyber Insurance Data: CISOs' Secret Weapon for Budgets</news:title>
      <news:keywords>CISOs, MFA, budget talks, cyber insurance, ransomware, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-29-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:00:08.952066+00:00</news:publication_date>
      <news:title>Daily Briefing: April 29, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-mythos-moment-enterprises-must-fight-agents-with-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:32:09.508594+00:00</news:publication_date>
      <news:title>Anthropic's 'Mythos' AI Threat: Defense Demands Agents</news:title>
      <news:keywords>AI threats, Anthropic, Mythos AI, agentic AI, cybersecurity, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vect-20-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:31:18.275769+00:00</news:publication_date>
      <news:title>VECT 2.0: The Ransomware That Just Destroys, Not Encrypts</news:title>
      <news:keywords>cybersecurity, data wiper, esxi security, malware analysis, ransomware, vect 2.0</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vimeo-confirms-user-and-customer-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:29:25.961818+00:00</news:publication_date>
      <news:title>Vimeo Data Breach: Third-Party Vendor Exposed User Info</news:title>
      <news:keywords>ShinyHunters, anodot, cybersecurity, data breach, third-party risk, vimeo</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/get-motivated-what-to-expect-from-our-keynote-at-rapid7s-global-cybersecurity-summit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:23:44.074479+00:00</news:publication_date>
      <news:title>Rapid7 Keynote: Special Forces Mindset for Cyber Ops?</news:title>
      <news:keywords>Rapid7, cybersecurity summit, incident response, jason fox, keynote, security operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/simplifying-aws-defense-with-microsoft-sentinel-ueba/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T05:21:35.810931+00:00</news:publication_date>
      <news:title>Microsoft Sentinel UEBA: AWS Defense Gets Smarter</news:title>
      <news:keywords>UEBA, aws security, cloudtrail, microsoft sentinel, security analytics, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vidar-rises-to-top-of-chaotic-infostealer-market/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:12:11.263388+00:00</news:publication_date>
      <news:title>[Vidar] Infostealer Kingpin Emerges From Market Chaos</news:title>
      <news:keywords>infostealer, lumma, malware, rhadamanthys, vidar</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:04:56.718819+00:00</news:publication_date>
      <news:title>GitHub Exploit: Your Code's New Security Nightmare?</news:title>
      <news:keywords>cloud security, command injection, cve-2026-3854, git push, github, rce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/feuding-ransomware-groups-leak-each-others-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:02:45.911329+00:00</news:publication_date>
      <news:title>Rival Ransomware Gangs Turn on Each Other: Data Dumped</news:title>
      <news:keywords>0APT, KryBit, cyber threat intelligence, data breach, data leak, malware, ransomware, ransomware groups</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:46:06.559218+00:00</news:publication_date>
      <news:title>LiteLLM SQLi Flaw: Hackers Strike API Keys</news:title>
      <news:keywords>API keys, CVE-2026-42208, LLM security, LiteLLM, SQL injection, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:37:38.496003+00:00</news:publication_date>
      <news:title>Code Cowboys: 73 Fake VS Code Extensions Hijacked by GlassWorm v2</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/video-service-vimeo-confirms-anodot-breach-exposed-user-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:36:19.088595+00:00</news:publication_date>
      <news:title>Vimeo Breach: Who Really Holds the Keys?</news:title>
      <news:keywords>ShinyHunters, anodot, cybersecurity, data breach, data exposure, vimeo</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:32:02.737125+00:00</news:publication_date>
      <news:title>PhantomCore's TrueConf Exploits Expose Russian Networks: A Deep Dive into the Attack Chain</news:title>
      <news:keywords>cybersecurity, hacktivism, phantomcore, russia, trueconf, vulnerabilities</news:keywords>
    </news:news>
  </url>
</urlset>
