<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:26:00.133279+00:00</news:publication_date>
      <news:title>APT28's PRISMEX Sneaks Into Ukraine's Veins, Wiping Emergency Lifelines</news:title>
      <news:keywords>APT28, NATO threats, PRISMEX, PRISMEX malware, Ukraine cyber attacks, steganography, steganography malware, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:22:30.898044+00:00</news:publication_date>
      <news:title>IVIP: Gartner's Bid to Illuminate Identity's Dark Matter — Or Vendor Smoke?</news:title>
      <news:keywords>IAM, IAM Attack Surface, IVIP, Identity Visibility, Orchid Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:21:05.414417+00:00</news:publication_date>
      <news:title>Phorpiex's Hybrid Botnet Surge: 125K Daily Infections Amid Apache's 13-Year RCE Wake-Up</news:title>
      <news:keywords>Apache ActiveMQ RCE, Phorpiex Twizt, ai ddos attacks, apache rce, cyber fraud 2025, cyber fraud losses, hybrid P2P botnet, phorpiex botnet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:21:00.226525+00:00</news:publication_date>
      <news:title>Inside Telegram's Shadow Markets: Men Arming Up with Spyware Against Wives</news:title>
      <news:keywords>AI Forensics, Telegram hacking groups, Telegram spyware, cyberstalking, digital-violence, domestic cyber-harassment, hacking tools wives, online surveillance tools, online-harassment, spyware-stalking, stalkerware, stalkerware market, telegram-abuse</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:17:56.263185+00:00</news:publication_date>
      <news:title>Anthropic's Mythos Preview: The AI That Hunts Bugs Better Than Your Team</news:title>
      <news:keywords>AI cybersecurity, AI exploits, Anthropic AI, Anthropic Claude, Anthropic Mythos, Claude AI, Claude Mythos Preview, Mythos Preview, Project Glasswing, cybersecurity AI threat, cybersecurity threats, exploit chains</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:16:42.823763+00:00</news:publication_date>
      <news:title>EngageLab SDK's Hidden Flaw Cracked Open 50 Million Android Devices — Crypto Wallets in the Crosshairs</news:title>
      <news:keywords>Android vulnerability, EngageLab SDK, crypto wallet security, intent redirection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:16:21.635443+00:00</news:publication_date>
      <news:title>Iranian Hackers Slip Into U.S. Water Plants and Power Grids Through Dumb Internet-Exposed PLCs</news:title>
      <news:keywords>Iran hackers, Iranian hackers, OT attacks, OT security, PLCs, PLCs vulnerabilities, critical infrastructure, cyber escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:10:22.617571+00:00</news:publication_date>
      <news:title>Iranian Hackers Tamper with US Water and Power PLCs: The OT Blind Spot Exposed</news:title>
      <news:keywords>ICS attacks, Iran hackers, OT security, PLC vulnerabilities, PLCs exposed, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:09:36.691298+00:00</news:publication_date>
      <news:title>Google's Chrome Cookie Lock: Good for Users, But Malware's Not Done Yet</news:title>
      <news:keywords>Chrome DBSC, Google Chrome update, browser security, cookie theft, cookie theft protection, malware defense, session credentials, session security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:08:45.729277+00:00</news:publication_date>
      <news:title>North Korean Hackers Slip 1,700 Poison Pills into npm, PyPI, and Beyond</news:title>
      <news:keywords>Contagious Interview, North Korean hackers, malicious npm packages, npm malware, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:07:59.181387+00:00</news:publication_date>
      <news:title>Orthanc DICOM Server's Nine Flaws: From Crashes to Remote Code Nightmares</news:title>
      <news:keywords>CERT-CC advisory, DICOM security, Orthanc vulnerabilities, RCE flaws, RCE healthcare, medical imaging exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:07:32.685485+00:00</news:publication_date>
      <news:title>99% of Enterprise Users Pack Browser Extensions – AI Ones Are the Sneaky Security Nightmare</news:title>
      <news:keywords>AI browser extensions, LayerX report, browser security, enterprise AI risks, enterprise risks, enterprise threats, security blind spot</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:07:13.309954+00:00</news:publication_date>
      <news:title>Fake Windows Update in France Steals Passwords from Breach-Exposed Users</news:title>
      <news:keywords>Electron infostealer, Electron malware, France data breaches, Windows malware, Windows update scam, fake Windows update, password stealer, password-stealing malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:04:39.044579+00:00</news:publication_date>
      <news:title>Politicians' Security Tabs Explode 5x as Threats Hit Home — Literally</news:title>
      <news:keywords>FEC data, FEC security data, campaign finance security, campaign security spending, campaign threats, election threats, election violence, political security spending, political threats, political violence, state security laws</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:03:43.415062+00:00</news:publication_date>
      <news:title>Shadow AI Is Already Leaking Enterprise Data — And No One's Watching</news:title>
      <news:keywords>AI governance, data exposure, data leaks, enterprise security, enterprise security risks, shadow AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:02:58.087745+00:00</news:publication_date>
      <news:title>Apple Intelligence's Shield Cracked: Hackers Sneak Past Your iPhone's AI Brain Guards</news:title>
      <news:keywords>AI guardrails, AI guardrails bypass, AI guardrails bypassed, Apple Intelligence, RSAC attack, RSAC research, prompt injection, unicode-attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:02:47.599100+00:00</news:publication_date>
      <news:title>Chrome 147's $86K WebML Double-Whammy: Two Critical Bugs That Could Crack the Browser Sandbox</news:title>
      <news:keywords>CVE-2026-5858, Chrome 147, WebML vulnerabilities, browser security patches, bug bounties, bug bounty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:02:18.749877+00:00</news:publication_date>
      <news:title>Lebanon's Jury-Rigged Crisis Tracker: Holding the Line in Israel's Shadow</news:title>
      <news:keywords>Israel Lebanon war, Israeli strikes Lebanon, Lebanon crisis, Lebanon emergency system, Lebanon war tech, crisis tracking platform, digital aid tracking, digital humanitarian aid, digital infrastructure crisis, displacement tracking, emergency digital platform, emergency displacement system, war displacement tech, war tech infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:01:54.845288+00:00</news:publication_date>
      <news:title>Chaos Botnet Goes After Cloud Goofs, Slaps on a SOCKS Proxy for Extra Sneakiness</news:title>
      <news:keywords>Chaos malware, SOCKS proxy, botnet evolution, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:00:11.775712+00:00</news:publication_date>
      <news:title>Claude Mythos Cracks Open Zero-Days Everywhere – Then Breaks Free</news:title>
      <news:keywords>AI cybersecurity, AI sandbox escape, Anthropic, Anthropic AI, Claude Mythos, Project Glasswing, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/obfuscated-javascript-or-nothing-thu-apr-9th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:59:55.931476+00:00</news:publication_date>
      <news:title>Phishing RAR Drops 10MB Obfuscated JS That Loads Formbook Stealer</news:title>
      <news:keywords>Formbook malware, Formbook stealer, PowerShell evasion, PowerShell payload, malware evasion, obfuscated JavaScript, phishing RAR, phishing malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/mitre-releases-fight-fraud-framework/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:57:31.189739+00:00</news:publication_date>
      <news:title>MITRE's F3 Framework Exposes Fraudsters' Hidden Playbook</news:title>
      <news:keywords>ATT&CK extension, ATT&CK framework, MITRE F3, cyber fraud, cyber fraud TTPs, cyber fraud framework, fight fraud framework, fraud TTPs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:57:26.817199+00:00</news:publication_date>
      <news:title>HackerOne Pauses Bug Bounties as AI Overwhelms Open Source Fixes</news:title>
      <news:keywords>AI remediation crisis, AI security, AI security tools, HackerOne, bug bounties, open source security, open source vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/russias-fancy-bear-apt-continues-its-global-onslaught/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:56:18.889753+00:00</news:publication_date>
      <news:title>Fancy Bear's 2023 Rampage: 100+ Targets, No Sophistication Required</news:title>
      <news:keywords>APT28, Fancy Bear, Russia cyber attacks, zero trust, zero trust security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/more-honeypot-fingerprinting-scans-wed-apr-8th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:55:53.940959+00:00</news:publication_date>
      <news:title>Attackers Taunt Honeypots with Absurd Logins – And They're Winning</news:title>
      <news:keywords>Cowrie, Cowrie honeypot, SSH attacks, SSH scans, fingerprinting, honeypot fingerprinting, honeypots, threat detection, threat hunting, threat scans</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:55:26.734056+00:00</news:publication_date>
      <news:title>Masjesu Botnet: Stealth DDoS Mercenary Invades IoT</news:title>
      <news:keywords>DDoS-for-hire, IoT malware, Masjesu Botnet, XorBot</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/fake-claude-site-installs-malware-that-gives-attackers-access-to-your-computer/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:55:18.016333+00:00</news:publication_date>
      <news:title>Claude Fans, One Wrong Click Hands Hackers Your Whole PC</news:title>
      <news:keywords>AI phishing scam, Claude phishing, DLL sideloading, PlugX RAT, PlugX malware, fake Claude malware, fake Claude site</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:54:44.812961+00:00</news:publication_date>
      <news:title>GlassWorm's Zig Dropper Turns Dev IDEs into Malware Hives</news:title>
      <news:keywords>GlassWorm Campaign, IDE infection, IDE infections, VS Code extensions, VS Code malware, Zig dropper, malware targeting IDEs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/your-next-breach-will-look-like-business-as-usual/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:53:26.707263+00:00</news:publication_date>
      <news:title>Credential Attacks: The Breach That Logs In Like Your Barista</news:title>
      <news:keywords>AI detection shifts, UEBA, UEBA tools, behavioral analytics, breach detection, breach prevention, credential-based attacks, cybersecurity models, cybersecurity shifts, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/do-ceasefires-slow-cyberattacks-history-suggests-not/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:52:31.182960+00:00</news:publication_date>
      <news:title>Ceasefires Never Paused Iranian Cyber Ops—Data Proves It</news:title>
      <news:keywords>APT33, IRGC cyber units, Iranian hackers, MuddyWater, ceasefires cyberattacks, cyber truce myths, cyberattacks ceasefires, geopolitical cyber threats, nation-state cyber ops</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/atomic-stealer-macos-clickfix-attack-bypasses-apple-security-warnings/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:52:04.652902+00:00</news:publication_date>
      <news:title>Atomic Stealer Slips Past Apple's Terminal Guard Using Script Editor Sleight-of-Hand</news:title>
      <news:keywords>Apple security bypass, Atomic Stealer, ClickFix attack, Jamf Threat Labs, macOS malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:51:31.304007+00:00</news:publication_date>
      <news:title>Eurail Breach Dumps 300K Travelers' Data into Hackers' Hands</news:title>
      <news:keywords>Eurail data breach, European railways security, GDPR fines, identity theft risk, passport theft, personal data theft, personal information theft, rail cybersecurity, travel data leak, travel data theft, travel security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/on-microsofts-lousy-cloud-security/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:51:29.786321+00:00</news:publication_date>
      <news:title>Microsoft's Government Cloud: Approved Despite 'Pile of Shit' Security Docs</news:title>
      <news:keywords>FedRAMP, FedRAMP approval, GCC High, Microsoft GCC High, Microsoft cloud security, ProPublica report, cloud security, cloud security failures, government cloud, government cloud risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/juniper-networks-patches-dozens-of-junos-os-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:50:43.521189+00:00</news:publication_date>
      <news:title>Juniper's Junos OS Nightmare: 36 Flaws That Could Hand Attackers Your Network Keys</news:title>
      <news:keywords>CVE-2026-33784, Juniper Networks, Junos OS, Junos OS vulnerabilities, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bluehammer-windows-zero-day-exploit-signals-microsoft-bug-disclosure-issues/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:49:52.144867+00:00</news:publication_date>
      <news:title>BlueHammer Zero-Day Exposes Microsoft's Patch Paralysis</news:title>
      <news:keywords>BlueHammer, BlueHammer exploit, Chaotic Eclipse, Microsoft bug bounty, Microsoft exploit, Windows zero-day, exploit disclosure, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:49:04.491841+00:00</news:publication_date>
      <news:title>Bitter's Hack-for-Hire Blitz Hits MENA Journalists, Echoing Indian Spy Reach</news:title>
      <news:keywords>Bitter APT, Indian cyber espionage, MENA phishing, OAuth attacks, hack-for-hire, spear phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/teampcp-supply-chain-campaign-update-007-cisco-source-code-stolen-via-trivy-linked-breach-google-gtig-tracks-teampcp-as-unc6780-and-cisa-kev-deadline-arrives-with-no-standalone-advisory-wed-apr-8th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:48:12.706325+00:00</news:publication_date>
      <news:title>Cisco's Source Code Raided: TeamPCP's Trivy Breach Exposes 300+ Repos and Gov Clients</news:title>
      <news:keywords>Cisco breach, TeamPCP, Trivy CVE, Trivy supply chain, Trivy vulnerability, UNC6780</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:48:05.952757+00:00</news:publication_date>
      <news:title>Chrome's DBSC Finally Ships: Session Theft's Days Are Numbered</news:title>
      <news:keywords>Chrome 146, DBSC, cookie stealing malware, infostealer malware, malware stealers, session theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/webinar-from-noise-to-signal-what-threat-actors-are-targeting-next/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:47:56.993161+00:00</news:publication_date>
      <news:title>Dark Web Chatter: The Signals Threat Actors Can't Hide Before They Strike</news:title>
      <news:keywords>Flare Systems, access brokers, dark web chatter, dark web monitoring, dark web signals, proactive defense, threat actors, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/middle-east-hack-for-hire-operation-traced-to-south-asian-cyber-espionage-group/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:46:47.950767+00:00</news:publication_date>
      <news:title>Bitter APT's ProSpy Spyware Hits Mideast Journalists Hard</news:title>
      <news:keywords>Bitter APT, Middle East cyber attacks, Middle East phishing, ProSpy spyware, hack-for-hire, spear phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/microsoft-finds-vulnerability-exposing-millions-of-android-crypto-wallet-users/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:46:15.391535+00:00</news:publication_date>
      <news:title>Microsoft Uncovers Android SDK Flaw Risking 30 Million Crypto Wallets</news:title>
      <news:keywords>Android vulnerability, EngageSDK flaw, Microsoft security research, crypto wallet security, crypto-wallets, engagesdk, intent redirection, microsoft-security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/russian-hacking-group-targets-home-and-small-office-routers-to-spy-on-users/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:45:49.146360+00:00</news:publication_date>
      <news:title>APT28 Turns Your Home Router into Russia's Spy Tool</news:title>
      <news:keywords>APT28, DNS hijacking, Fancy Bear, SOHO Routers, TP-Link vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/just-three-ransomware-gangs-accounted-for-40-of-attacks-last-month/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:45:42.394383+00:00</news:publication_date>
      <news:title>Qilin, Akira, Dragonforce: Ransomware's Brutal Top Trio Claims 40% of March Carnage</news:title>
      <news:keywords>Akira ransomware, Check Point, Dragonforce, Dragonforce RaaS, Qilin ransomware, ransomware attacks, ransomware attacks 2026</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/healthcare-it-solutions-provider-chipsoft-hit-by-ransomware-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:45:28.918751+00:00</news:publication_date>
      <news:title>ChipSoft Ransomware Cripples Dutch Hospitals' EHR Backbone</news:title>
      <news:keywords>ChipSoft ransomware, Dutch hospitals, Dutch hospitals hack, Dutch hospitals outage, EHR breach, EHR outage, HiX EHR outage, Z-CERT, healthcare IT attack, healthcare cyberattack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:45:24.172349+00:00</news:publication_date>
      <news:title>Adobe Reader Zero-Day Powers Sneaky PDF Attacks on Oil Pros Since Late 2025</news:title>
      <news:keywords>Adobe Reader zero-day, PDF exploit, RCE sandbox escape, RCE vulnerability, Russian malware, data exfiltration, malicious JavaScript, malicious PDFs, zero-day vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:45:17.492041+00:00</news:publication_date>
      <news:title>LucidRook's Lua Stealth Assault on Taiwan's NGOs and Universities</news:title>
      <news:keywords>Cisco Talos, Lua malware, LucidRook, LucidRook malware, Taiwan attacks, Taiwan cyberattacks, Taiwan phishing, spear phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/us-thwarts-dns-hijacking-network-controlled-by-russian-apt28-hackers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:44:46.804023+00:00</news:publication_date>
      <news:title>US Crushes APT28's Sneaky Router Takeover Plot</news:title>
      <news:keywords>APT28, DNS hijacking, Operation Masquerade, Russian GRU, SOHO Routers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/number-usage-in-passwords-take-two-thu-apr-9th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:44:31.001133+00:00</news:publication_date>
      <news:title>Bots Are Already Guessing Passwords with 2027 — a Full Year Early</news:title>
      <news:keywords>DDoS probes, bot predictions, botnets, cyber threats, future years passwords, honeypots, password brute-force, password cracking, year patterns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:44:13.902349+00:00</news:publication_date>
      <news:title>Inside the Payroll Pirate Heist: How Storm-2755 Stole Salaries from Microsoft Workers</news:title>
      <news:keywords>AiTM attacks, AiTM phishing, Microsoft 365 security, Storm-2755, payroll pirate attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:43:51.522281+00:00</news:publication_date>
      <news:title>VENOM Phishing: Execs' Microsoft Logins in Crosshairs</news:title>
      <news:keywords>C-suite attacks, MFA bypass, Microsoft AiTM, Microsoft credential theft, PhaaS, QR code phishing, VENOM phishing, executive phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bitcoin-depot-reports-36m-crypto-theft-after-system-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:41:25.639150+00:00</news:publication_date>
      <news:title>Bitcoin Depot's $3.6M Bitcoin Heist: Hackers Strike Corporate Vaults Again</news:title>
      <news:keywords>Bitcoin ATM breach, Bitcoin ATM hack, Bitcoin Depot, Bitcoin Depot hack, crypto theft, cyber breach, cybersecurity incident</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/iranbacked-threat-actors-hit-us-cni-providers-via-internetfacing-ot-assets/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:40:54.992179+00:00</news:publication_date>
      <news:title>Iranian Hackers Punch Through US Water Plants Using Exposed Factory PLCs</news:title>
      <news:keywords>CISA advisory, CNI attacks, Iran hackers, OT PLC vulnerabilities, OT vulnerabilities, Rockwell Automation, Rockwell PLCs, US CNI attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/claude-discovers-apache-activemq-bug-hidden-for-13-years/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:40:21.695014+00:00</news:publication_date>
      <news:title>Claude AI Digs Up 13-Year RCE Lurking in Apache ActiveMQ</news:title>
      <news:keywords>Apache ActiveMQ, CVE-2026-34197, Claude AI, RCE vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/when-attackers-already-have-the-keys-mfa-is-just-another-door-to-open/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:40:16.969147+00:00</news:publication_date>
      <news:title>Wearable Biometrics Finally Fix Stolen Credential Hell</news:title>
      <news:keywords>MFA bypass, Token security, phishing attacks, phishing prevention, phishing relays, stolen credentials, wearable biometrics</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/in-other-news-cyberattack-stings-stryker-windows-zero-day-china-supercomputer-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:40:05.277907+00:00</news:publication_date>
      <news:title>Fed Frets Over Anthropic's Mythos AI as Mac Stealers and Zero-Days Ignite Cyber Firestorm</news:title>
      <news:keywords>AI security risks, Anthropic Mythos, Windows zero-day, cybersecurity roundup, macOS stealer, post-quantum crypto, post-quantum cryptography</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/can-anthropic-keep-its-exploit-writing-ai-out-of-the-wrong-hands/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:38:53.418939+00:00</news:publication_date>
      <news:title>Anthropic's Mythos Preview Hunts Zero-Days — But Who Controls the Leash?</news:title>
      <news:keywords>AI security risks, AI security tools, Anthropic Mythos, vulnerability AI, vulnerability discovery, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:38:24.396366+00:00</news:publication_date>
      <news:title>LucidRook Unleashed: New Lua Malware Stalks Taiwan's NGOs in Stealthy Spear-Phishing</news:title>
      <news:keywords>Cisco Talos, DLL side-loading, LucidRook, LucidRook malware, Taiwan spear-phishing, UAT-10362, spear-phishing Taiwan</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cpuid-hacked-to-deliver-malware-via-cpu-z-hwmonitor-downloads/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:37:38.799071+00:00</news:publication_date>
      <news:title>CPUID's Trusted Tools Turn Toxic: Hackers Poison CPU-Z and HWMonitor Downloads</news:title>
      <news:keywords>CPU-Z malware, CPUID hack, HWMonitor trojan, infostealer trojan, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/google-warns-of-new-threat-group-targeting-bpos-and-helpdesks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:37:29.074026+00:00</news:publication_date>
      <news:title>Google Exposes UNC6783: Chat-Phishing Extortion Wave Hits BPOs Where It Hurts</news:title>
      <news:keywords>BPO phishing, Google Threat Intelligence, MFA bypass, UNC6783, Zendesk spoofing, extortion via chat, live chat attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/critical-vulnerability-in-ninja-forms-exposes-wordpress-sites/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:36:15.887327+00:00</news:publication_date>
      <news:title>Ninja Forms' Deadly Upload Flaw Lets Hackers Seize WordPress Sites in Seconds</news:title>
      <news:keywords>Ninja Forms vulnerability, RCE WordPress, WordPress security, cvss 9.8, file upload exploit, wordfence bounty, wordpress rce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/critical-marimo-flaw-exploited-hours-after-public-disclosure/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:33:06.990914+00:00</news:publication_date>
      <news:title>Attackers Crack Marimo's RCE Flaw in Under 10 Hours — No PoC Needed</news:title>
      <news:keywords>CVE-2026-39987, Marimo vulnerability, RCE exploit, Sysdig honeypot</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:31:46.514485+00:00</news:publication_date>
      <news:title>Gmail's Mobile E2EE Unlocks – Enterprise Privacy Gets Real</news:title>
      <news:keywords>Gmail E2EE, Google Workspace, client-side encryption, end-to-end encryption, enterprise email security, enterprise privacy, enterprise security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/threat-actors-get-crafty-with-emojis-to-escape-detection/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:29:44.115548+00:00</news:publication_date>
      <news:title>Hackers Ditch Code Words for Emojis to Slip Past Filters</news:title>
      <news:keywords>cyber evasion tactics, cybercrime communication, cybercrime tactics, dark web communication, dark web markets, detection evasion, emoji evasion, malware marketplaces, malware obfuscation, threat actor tactics, threat actors emojis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/russias-forest-blizzard-nabs-rafts-of-logins-via-soho-routers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:28:07.390281+00:00</news:publication_date>
      <news:title>Forest Blizzard's Router Trick Steals Logins Worldwide</news:title>
      <news:keywords>APT28, DNS hijacking, Forest Blizzard, SOHO Routers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cracks-in-the-bedrock-agent-god-mode/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:27:23.394302+00:00</news:publication_date>
      <news:title>AWS Bedrock AgentCore's God Mode: One Toolkit, Total Account Takeover</news:title>
      <news:keywords>AI agent security, AWS Bedrock AgentCore, Agent God Mode, AgentCore, AgentCore vulnerability, Amazon Bedrock, IAM Vulnerability, IAM privilege escalation, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/nearly-4000-us-industrial-devices-exposed-to-iranian-cyberattacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:27:14.656345+00:00</news:publication_date>
      <news:title>4,000 U.S. Factory PLCs Begging for Iranian Hackers</news:title>
      <news:keywords>Iranian cyberattacks, OT security, Rockwell Automation PLCs, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/google-chrome-adds-infostealer-protection-against-session-cookie-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:27:05.544305+00:00</news:publication_date>
      <news:title>Chrome's Hardware Trick to Kill Stolen Cookies: Smart Fix or Dev Headache?</news:title>
      <news:keywords>Chrome DBSC, DBSC, Google Chrome, Google security update, TPM security, infostealer malware, session cookie theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:23:13.658394+00:00</news:publication_date>
      <news:title>Adobe Acrobat Zero-Day Active Since December—Users Exposed</news:title>
      <news:keywords>Adobe Acrobat, Adobe Acrobat Reader, CVE-2024-36364, PDF exploit, PDF vulnerability, acrobat reader zero-day, adobe pdf vulnerability, adobe vulnerability, cve-2024-20766, rce attack, remote code execution, zero-day exploit, zero-day vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hims-breach-exposes-the-most-sensitive-kinds-of-phi/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:19:49.568751+00:00</news:publication_date>
      <news:title>Hims Hack Outs User's Bald Spots, ED Meds, and Weight Loss Secrets</news:title>
      <news:keywords>Hims breach, PHI exposure, Scattered Spider, data extortion, health data leak, telehealth hack, telehealth security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/iranian-threat-actors-disrupt-us-critical-infrastructure-via-exposed-plcs/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:17:06.452952+00:00</news:publication_date>
      <news:title>Iranian Hackers Hijack US PLCs: The Digital Sabotage We Saw Coming</news:title>
      <news:keywords>Iranian threat actors, OT security, critical infrastructure, exposed PLCs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:11:49.351642+00:00</news:publication_date>
      <news:title>Billion CISA Records Prove Human Security Can't Keep Up</news:title>
      <news:keywords>AI threats, CISA KEV, Qualys research, human-scale security, vulnerability remediation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T09:09:41.829401+00:00</news:publication_date>
      <news:title>Smart Slider's Poisoned Update: Hackers Slip Backdoors into 900K WordPress Sites</news:title>
      <news:keywords>Joomla backdoor, Smart Slider 3 Pro, Smart Slider hack, WordPress malware, plugin supply chain attack, supply chain attack</news:keywords>
    </news:news>
  </url>
</urlset>
