<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/undermining-the-trust-boundary-investigating-a-stealthy-intrusion-through-third-party-compromise/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:40:52.324777+00:00</news:publication_date>
      <news:title>Third-Party Compromise: The Silent Invasion of Trusted Systems</news:title>
      <news:keywords>IT services providers, Microsoft Incident Response, administrative tools, stealthy intrusion, third-party compromise, trust boundary</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:56:34.009245+00:00</news:publication_date>
      <news:title>TrickMo Uses TON for Android Network Pivots</news:title>
      <news:keywords>Android malware, SOCKS5 proxy, TON, The Open Network, TrickMo, network pivot</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/apple-patches-dozens-of-vulnerabilities-in-macos-ios/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:31:38.743640+00:00</news:publication_date>
      <news:title>Apple Patches Dozens of Flaws [Urgent Update Required]</news:title>
      <news:keywords>apple, cve, cybersecurity, ios security, macOS security, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/20-leaders-who-built-the-ciso-era-2-decades-of-change/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:20:45.711816+00:00</news:publication_date>
      <news:title>CISO Era's Architects: 20 Years of Risk Rewritten</news:title>
      <news:keywords>CISO, cybersecurity, enterprise risk management, security leaders</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-agentic-ai-is-securitys-next-blind-spot/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T11:35:06.779557+00:00</news:publication_date>
      <news:title>Agentic AI Security Gap: What It Means for You</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/malicious-hugging-face-repository-typosquats-openai/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:26:23.676436+00:00</news:publication_date>
      <news:title>Hugging Face Hack: AI Supply Chain Danger Exposed</news:title>
      <news:keywords>AI supply chain, OpenAI, cybersecurity, hugging face, infostealer malware, typosquatting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/official-checkmarx-jenkins-package-compromised-with-infostealer/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:06:13.709655+00:00</news:publication_date>
      <news:title>Checkmarx Jenkins Plugin Hijacked [Infostealer Attack]</news:title>
      <news:keywords>checkmarx, ci/cd, devsecops, infostealer, jenkins, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-365tb-canvas-leak/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:51:52.969511+00:00</news:publication_date>
      <news:title>Canvas Pays Ransom: 3.65TB Data Stolen, Schools Left Exposed</news:title>
      <news:keywords>ShinyHunters, canvas, cybersecurity, data leak, instructure, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-12-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:00:01.912895+00:00</news:publication_date>
      <news:title>Daily Briefing: May 12, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/state-of-ransomware-in-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:45:35.977022+00:00</news:publication_date>
      <news:title>Ransomware in 2026: Quantum, No Encryption, and EDR Killers</news:title>
      <news:keywords>EDR killers, Kaspersky, RDWeb, encryptionless extortion, post-quantum cryptography, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-ghostlock-tool-abuses-windows-api-to-block-file-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T05:57:47.765227+00:00</news:publication_date>
      <news:title>GhostLock Tool Locks Files Via Windows API [Security Alert]</news:title>
      <news:keywords>Denial of Service, Windows API, file access, ghostlock, security exploit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/as-the-nvd-scales-back-cve-enrichment-heres-what-tenable-customers-need-to-know/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T05:50:15.988021+00:00</news:publication_date>
      <news:title>NVD Scales Back CVE Enrichment: What Tenable Customers Need to Know</news:title>
      <news:keywords>CVE enrichment, NVD, Tenable, cybersecurity risk, vulnerability intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/eyes-wide-open-how-to-mitigate-the-security-and-privacy-risks-of-smart-glasses/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T05:30:37.538530+00:00</news:publication_date>
      <news:title>Smart Glasses: Your Face is Now a Data Mine</news:title>
      <news:keywords>AI, data breach, privacy, security, smart glasses, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:08:48.495161+00:00</news:publication_date>
      <news:title>TeamPCP Hits Checkmarx Again: The Supply Chain Trust Game</news:title>
      <news:keywords>TeamPCP, ast plugin, checkmarx, cybersecurity, jenkins, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/final-countdown-last-chance-to-join-the-rapid7-global-cybersecurity-summit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T18:01:50.374128+00:00</news:publication_date>
      <news:title>Rapid7 Summit: AI, Exposure, and SOC Realities for 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/gtig-ai-threat-tracker-adversaries-leverage-ai-for-vulnerability-exploitation-augmented-operations-and-initial-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:15:42.321453+00:00</news:publication_date>
      <news:title>AI Used for Exploits: What It Means for You</news:title>
      <news:keywords>ai threat intelligence, generative ai security, malware development, nation-state threats, supply chain attacks, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:32:59.421885+00:00</news:publication_date>
      <news:title>Dirty Frag Exploit Hits Enterprise Linux [Analysis]</news:title>
      <news:keywords>cybersecurity, dirty frag, enterprise linux, linux exploit, privilege escalation, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/feeding-frenzy-rce-on-azure-cosmos-for-postgresql/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:56:58.118738+00:00</news:publication_date>
      <news:title>Azure RCE: Cosmos DB Feeding Frenzy Uncovered</news:title>
      <news:keywords>RCE vulnerability, Varonis, azure cosmos for postgresql, cloud security, database vulnerability, feeding frenzy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/why-changing-passwords-doesnt-end-an-active-directory-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:13:50.921322+00:00</news:publication_date>
      <news:title>Active Directory Leaks: Why Password Resets Fail</news:title>
      <news:keywords>active directory, credential theft, cybersecurity, data breach, kerberos, password reset</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cyber-espionage-group-targets-aviation-firms-to-steal-map-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T12:43:45.460189+00:00</news:publication_date>
      <news:title>Aviation Cyber-Spies Steal Map Data [Threat Analysis]</news:title>
      <news:keywords>GIS data, GPS data, aviation security, cyber espionage, map data theft, terrain models</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cloudflare-lays-off-1100-employees-in-ai-driven-restructuring/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T11:40:59.375425+00:00</news:publication_date>
      <news:title>Cloudflare AI Layoffs: A Harbinger or a Hiccup?</news:title>
      <news:keywords>ai layoffs, artificial intelligence, cloudflare, cybersecurity jobs, tech restructuring</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-state-of-ransomware-q1-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T10:27:17.449190+00:00</news:publication_date>
      <news:title>Ransomware Consolidation: Top Groups Now Control 71% of Victims</news:title>
      <news:keywords>Q1 2026, RaaS, cybersecurity, data leak sites, ransomware, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:56:30.718046+00:00</news:publication_date>
      <news:title>TrickMo Banker Hides on TON Blockchain: A New C2 Game</news:title>
      <news:keywords>Android malware, C2 infrastructure, TON blockchain, TrickMo, banking trojan, command and control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/copy-fail-what-you-need-to-know-about-the-most-severe-linux-threat-in-years/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:49:58.382055+00:00</news:publication_date>
      <news:title>Copy Fail: Linux Kernel Threat Exposes Root Access</news:title>
      <news:keywords>AI security, copy fail, cve-2026-31431, cybersecurity, linux kernel, linux kernel vulnerability, local privilege escalation, privilege escalation, root access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-11-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:00:01.916827+00:00</news:publication_date>
      <news:title>Daily Briefing: May 11, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/vsphere-and-brickstorm-malware-a-defenders-guide/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:49:59.151826+00:00</news:publication_date>
      <news:title>BRICKSTORM Hits vSphere: Under the Hood of Virtualization's New Threat</news:title>
      <news:keywords>BRICKSTORM, cybersecurity, malware, mandiant, vSphere, virtualization</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cracks-in-the-bedrock-escaping-the-aws-agentcore-sandbox/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:47:07.795083+00:00</news:publication_date>
      <news:title>[AWS AgentCore] Sandbox Escaped Via DNS Tunneling</news:title>
      <news:keywords>AgentCore, aws bedrock, code interpreter, dns tunneling, sandbox escape, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/4th-may-threat-intelligence-report/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:41:29.680179+00:00</news:publication_date>
      <news:title>AI Hacks & Data Scrapes: This Week's Cyber Reckoning</news:title>
      <news:keywords>AI cyber threats, Medtronic, data breach, malware, phishing, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/20th-april-threat-intelligence-report/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:40:59.918161+00:00</news:publication_date>
      <news:title>AI Unleashed: Hacking's New Frontier</news:title>
      <news:keywords>AI threats, cybersecurity, data breach, government breach, threat intelligence, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/threat-brief-exploitation-of-pan-os-captive-portal-zero-day-for-unauthenticated-remote-code-execution/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:40:25.182080+00:00</news:publication_date>
      <news:title>PAN-OS Zero-Day Exploited: RCE Against Firewalls</news:title>
      <news:keywords>PAN-OS, cve-2026-0300, firewall security, remote code execution, state-sponsored threats, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/defending-your-enterprise-when-ai-models-can-find-vulnerabilities-faster-than-ever/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:30:35.489654+00:00</news:publication_date>
      <news:title>AI Finds Exploits. Are You Ready?</news:title>
      <news:keywords>AI security, AI vulnerability discovery, enterprise security, exploit development, threat actors, zero-day exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/over-500-organizations-hit-in-years-long-phishing-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:21:02.375357+00:00</news:publication_date>
      <news:title>Operation HookedWing: 500+ Orgs Breached in 4-Year Phishing Assault</news:title>
      <news:keywords>Operation HookedWing, SOCRadar, credential theft, cyber attack, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-week-in-security-april-27-8211-may-3/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T19:07:23.013758+00:00</news:publication_date>
      <news:title>AI's Leap: From Sandbox to Security Superhero?</news:title>
      <news:keywords>AI, cybersecurity, data breaches, scams, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-abuse-google-ads-claudeai-chats-to-push-mac-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T18:00:32.045534+00:00</news:publication_date>
      <news:title>Claude.ai Chats & Google Ads Weaponized for Mac Malware</news:title>
      <news:keywords>claude.ai, google ads, infostealer, mac malware, macOS security, malvertising</news:keywords>
    </news:news>
  </url>
</urlset>
