<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/canvas-attackers-compromise-275m-students-teachers-and-staff/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:04:52.086124+00:00</news:publication_date>
      <news:title>Canvas Breach: 275M Students Exposed. It's Not Just Tech.</news:title>
      <news:keywords>ShinyHunters, canvas, data breach, edtech, instructure, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/shifting-budget-dynamics-for-identity-security-and-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:44:37.674040+00:00</news:publication_date>
      <news:title>[Budget Shift] AI Agent Security Budgets Diverge Dramatically</news:title>
      <news:keywords>AI agent security, IAM, Omdia research, budget dynamics, identity-security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:35:58.831508+00:00</news:publication_date>
      <news:title>[Water Crisis] Polish Security Agency Reports ICS Breaches</news:title>
      <news:keywords>APT28, ICS, OT, Poland, cyberattack, water treatment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-the-approaching-flood-of-vulnerabilities-changes-everything-and-what-to-do-about-it/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:29:22.434283+00:00</news:publication_date>
      <news:title>AI Creates CVE Flood: NVD Retreat Wrecks Patching</news:title>
      <news:keywords>AI cybersecurity, cve, cybersecurity threats, nist, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:29:00.260909+00:00</news:publication_date>
      <news:title>Linux PamDOORa Backdoor Emerges: Stealing SSH Creds</news:title>
      <news:keywords>Linux backdoor, PAM modules, authentication, backdoor, cybercrime, cybersecurity, linux, malware, pamdoora, pluggable authentication modules, ssh credentials</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-more-analysts-wont-solve-your-socs-alert-problem/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:27:57.732464+00:00</news:publication_date>
      <news:title>AI in SOC: Analysts Won't Solve Alert Overload</news:title>
      <news:keywords>AI in Security, SOC, alert fatigue, cybersecurity, incident response, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/another-universal-linux-local-privilege-escalation-lpe-vulnerability-dirty-frag-fri-may-8th/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:27:44.683869+00:00</news:publication_date>
      <news:title>Dirty Frag LPE: Linux Kernel Vulnerability Strikes Again [Analysis]</news:title>
      <news:keywords>dirty frag, kernel exploit, linux kernel, local privilege escalation, lpe, security vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:20:25.358738+00:00</news:publication_date>
      <news:title>RCE in xrdp: How a Simple String Conversion Opened the Door</news:title>
      <news:keywords>CVE-2025-68670, Kaspersky, RDP, linux security, rce, remote code execution, remote desktop, xrdp</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:16:50.539644+00:00</news:publication_date>
      <news:title>Ivanti Zero-Day: Feds Scramble as CISA Issues 4-Day Patch Mandate</news:title>
      <news:keywords>CISA, CVE-2026-6973, cybersecurity, epmm, federal agencies, ivanti, ivanti epmm, vulnerability, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:16:32.028570+00:00</news:publication_date>
      <news:title>[Data] 1% of Alerts Hide a Missed Breach Weekly</news:title>
      <news:keywords>EDR, cloud security, enterprise security, low-severity threats, phishing, security alerts</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/trellix-source-code-breach-claimed-by-ransomhouse-hackers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:15:02.997064+00:00</news:publication_date>
      <news:title>Trellix Source Code Breach: RansomHouse Claims Attack</news:title>
      <news:keywords>cybersecurity, data extortion, ransomhouse, source code breach, trellix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:12:11.683546+00:00</news:publication_date>
      <news:title>Braintrust API Keys Compromised in AWS Breach</news:title>
      <news:keywords>AI, API keys, AWS, braintrust, cloud security, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/zero-chaos-scaling-detection-engineering-at-the-speed-of-software-with-detection-as-code/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:11:21.916521+00:00</news:publication_date>
      <news:title>Security Detections: From Chaos to Code [Rapid7's Approach]</news:title>
      <news:keywords>AI in Security, Rapid7, SIEM, ci/cd, detection as code, detection engineering, devsecops, infrastructure as code, security operations, terraform, threat hunting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/voidstealer-malware-darts-past-google-chromes-encryption/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:00:34.818181+00:00</news:publication_date>
      <news:title>VoidStealer Exploits Chrome Encryption [New Threat]</news:title>
      <news:keywords>Google Chrome, app-bound encryption, cybersecurity, infostealer, malware, voidstealer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-19/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:58:37.267138+00:00</news:publication_date>
      <news:title>Cybercrime Court Victories, Evolving Worms & Zero-Days</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-07-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:00:01.888523+00:00</news:publication_date>
      <news:title>Daily Briefing: May 07, 2026</news:title>
      
    </news:news>
  </url>
</urlset>
