<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/mythos-ready-security-csa-urges-cisos-to-prepare-for-accelerated-ai-threats/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:53:51.743903+00:00</news:publication_date>
      <news:title>[CSA Warning] Mythos-Ready Security: AI Threat Storm Looms</news:title>
      <news:keywords>AI cybersecurity threats, CISO preparation, Cloud Security Alliance, Mythos AI, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/your-cloud-detection-strategy-in-2026-what-to-expect-at-the-global-cybersecurity-summit/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:06:26.186246+00:00</news:publication_date>
      <news:title>Cloud Detection in 2026: Summit Hype or Reality?</news:title>
      <news:keywords>Rapid7 Summit, SOC evolution, cloud detection, cybersecurity 2026</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/uk-cyber-security-council-launches-associate-cyber-security-professional-title/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:57:27.923482+00:00</news:publication_date>
      <news:title>UK Cyber Council Launches Associate Cyber Pro Title [Skills Gap Fix?]</news:title>
      <news:keywords>UK Cyber Security Council, associate cyber professional, cyber security skills gap, cybersecurity certification</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/janelarat-a-financial-threat-targeting-users-in-latin-america/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:48:57.819351+00:00</news:publication_date>
      <news:title>JanelaRAT: LATAM Bank Thieves' Window into Your Wallet [Analysis]</news:title>
      <news:keywords>DLL sideloading, JanelaRAT, LATAM malware, financial trojan, phishing campaigns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/operation-atlantic-seizes-12m-in-crypto-losses/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:48:46.827101+00:00</news:publication_date>
      <news:title>$12M Crypto Scam Funds Frozen in Operation Atlantic</news:title>
      <news:keywords>NCA crypto operation, Operation Atlantic, approval phishing, crypto scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/gmail-brings-end-to-end-encryption-to-android-and-ios-for-enterprise-users/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:07:24.899200+00:00</news:publication_date>
      <news:title>Gmail E2EE Hits Mobile: Enterprise Encryption Unlocked</news:title>
      <news:keywords>Gmail E2EE, Google Workspace, end-to-end encryption, enterprise security, mobile-encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:19:54.744146+00:00</news:publication_date>
      <news:title>[OpenAI Axios Hack] macOS Cert Revoked After North Korean Breach</news:title>
      <news:keywords>Axios supply chain attack, North Korean hackers, OpenAI breach, macOS certificate revocation, unc1069</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-week-in-security-april-6-8211-april-12/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T08:52:39.062283+00:00</news:publication_date>
      <news:title>[10 Threats] A Week in Security: Fake Claude Malware to Killer Robots</news:title>
      <news:keywords>data breaches, fake Claude malware, killer robots, router hacking, scam guard, security threats april 2024</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:39:39.648797+00:00</news:publication_date>
      <news:title>[Critical RCE] Marimo Flaw Exploited 10 Hours Post-Disclosure</news:title>
      <news:keywords>CVE-2026-39987, marimo-rce, python-notebook, remote code execution, sysdig</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-14-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:00:08.669265+00:00</news:publication_date>
      <news:title>Daily Briefing: April 14, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/mobile-app-permissions-still-matter-more-than-you-may-think/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:41:55.251448+00:00</news:publication_date>
      <news:title>Mobile App Permissions: Still Your Last Defense [5 Red Flags]</news:title>
      <news:keywords>AI app risks, Android permissions, app permissions, iOS privacy, mobile security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/promptspy-ushers-in-the-era-of-android-threats-using-genai/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:30:45.062824+00:00</news:publication_date>
      <news:title>[First] PromptSpy: Android Malware Hijacks Gemini AI</news:title>
      <news:keywords>Android malware, ESET research, Gemini AI abuse, Gemini abuse, PromptSpy, generative AI threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T05:19:34.765204+00:00</news:publication_date>
      <news:title>150+ Victims Hit in CPUID Breach [STX RAT Trojan]</news:title>
      <news:keywords>CPU-Z malware, CPU-Z trojan, CPUID breach, DLL side-loading, STX RAT, supply chain attack, watering hole attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-february-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T19:13:38.011548+00:00</news:publication_date>
      <news:title>[February 2026] AI Powers 600+ FortiGate Hacks & ATM Jackpots</news:title>
      <news:keywords>ATM jackpotting, FortiGate hacks, PromptSpy, cybersecurity February 2026, generative AI malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/protecting-education-how-mdr-can-tip-the-balance-in-favor-of-schools/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T18:15:24.056564+00:00</news:publication_date>
      <news:title>Ransomware on Schools Up 23% in 2025: MDR Hype or Help?</news:title>
      <news:keywords>MDR, education cybersecurity, nation-state threats, ransomware schools</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/how-smbs-use-threat-research-and-mdr-to-build-a-defensive-edge/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:53:01.353411+00:00</news:publication_date>
      <news:title>SMBs Cut Breach Risks 40% with MDR + Threat Intel [ESET Data]</news:title>
      <news:keywords>ESET, MDR, SMB cybersecurity, ransomware defense, threat research</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-cybersecurity-actually-does-for-your-business/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:56:31.126578+00:00</news:publication_date>
      <news:title>Cybersecurity ROI: Proving Value When Nothing Happens</news:title>
      <news:keywords>MDR, cybersecurity ROI, data breach cost, risk management, security budget</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cyber-fallout-from-the-iran-war-what-to-have-on-your-radar/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:49:14.124746+00:00</news:publication_date>
      <news:title>War in the Wires: Iran Attacks Cloud Data Centers</news:title>
      <news:keywords>Iran cyber attacks, cloud security, data center attacks, faketivism, nation-state threats, supply chain compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/sednit-reloaded-back-in-the-trenches/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:32:57.886149+00:00</news:publication_date>
      <news:title>Sednit Reloaded: Old Code, New Tricks [Ukraine]</news:title>
      <news:keywords>APT28, Fancy Bear, cyber espionage, malware, sednit, ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/face-value-what-it-takes-to-fool-facial-recognition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:27:31.043448+00:00</news:publication_date>
      <news:title>Facial Recognition Fools: Can You Trust Your Face?</news:title>
      <news:keywords>AI, biometric security, cybersecurity, facial recognition, identity verification, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edr-killers-explained-beyond-the-drivers/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:34:15.428130+00:00</news:publication_date>
      <news:title>EDR Killers: The $100M Problem Hackers Can't Ignore</news:title>
      <news:keywords>BYOVD, EDR killer, cybersecurity, malware analysis, ransomware, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/move-fast-and-save-things-a-quick-guide-to-recovering-a-hacked-account/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:04:28.582079+00:00</news:publication_date>
      <news:title>Hack Recovery: Act Fast or Lose It</news:title>
      <news:keywords>account recovery, cybersecurity, hacked accounts, malware, online security, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/rsac-2026-wrap-up-week-in-security-with-tony-anscombe/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:02:39.052353+00:00</news:publication_date>
      <news:title>RSAC 2026: AI Is Here. Are You?</news:title>
      <news:keywords>AI agents, AI security, RSAC 2026, cybersecurity risks, threat landscape</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cloud-workload-security-mind-the-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:22:31.549212+00:00</news:publication_date>
      <news:title>Cloud Security: The Messy Reality of Complexity</news:title>
      <news:keywords>Frankencloud, cloud visibility, cloud workload security, cybersecurity complexity, data breach costs, security automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-13-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:00:06.479304+00:00</news:publication_date>
      <news:title>Daily Briefing: April 13, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:51:42.899142+00:00</news:publication_date>
      <news:title>Cyber Breakout Time: 80% of RaaS Groups Use AI</news:title>
      <news:keywords>AI cybersecurity, MDR, RaaS, XDR, breakout time, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-march-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:46:28.442906+00:00</news:publication_date>
      <news:title>March Security: Hackers Hit Medtech, Data Theft Soars</news:title>
      <news:keywords>cybersecurity, data breach, encryption, phishing, ransomware, stryker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/virtual-machines-virtually-everywhere-and-with-real-security-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CVE Watch</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:38:01.182949+00:00</news:publication_date>
      <news:title>23% of Orgs Lack Cloud Visibility: VM Sprawl a Major Risk</news:title>
      <news:keywords>cloud security, cybersecurity threats, identity and access management, virtual machine vulnerabilities, virtual machines, vm sprawl</news:keywords>
    </news:news>
  </url>
</urlset>
