<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/telegram-mini-apps-abused-for-crypto-scams-android-malware-delivery/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T14:35:33.348013+00:00</news:publication_date>
      <news:title>Telegram Scams Exploit Mini Apps</news:title>
      <news:keywords>Android malware, crypto scams, femibot, mini apps, phishing, telegram</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T13:50:37.575639+00:00</news:publication_date>
      <news:title>Beyond the Green Dashboards: Real Security Needs More Than Just Patches</news:title>
      <news:keywords>cyber threat intelligence, cybersecurity, exposure management, risk reduction, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/microsoft-fixes-remote-desktop-warnings-displaying-incorrectly/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T12:13:56.069774+00:00</news:publication_date>
      <news:title>Microsoft's RDP Fix: A Patch, Not a Panacea?</news:title>
      <news:keywords>microsoft, phishing, rdp files, remote desktop, security warnings, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T11:18:50.914809+00:00</news:publication_date>
      <news:title>LiteLLM SQLi Exploited in 36 Hours [CVE-2026-42208]</news:title>
      <news:keywords>AI security, CVE-2026-42208, LLM vulnerabilities, LiteLLM, SQL injection, open source security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/meet-bluekit-the-ai-powered-all-in-one-phishing-kit/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:54:17.353460+00:00</news:publication_date>
      <news:title>Phishing Kit Ditches Old Ways for AI [Bluekit Analysis]</news:title>
      <news:keywords>AI in cybersecurity, Bluekit, cybercrime tools, phishing kits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:50:07.782775+00:00</news:publication_date>
      <news:title>CISA Flags Exploited ConnectWise, Windows Bugs</news:title>
      <news:keywords>CISA, CVE-2024-1708, ConnectWise ScreenConnect, KEV, Known Exploited Vulnerabilities, Microsoft Windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/what-to-watch-this-week-zero-trusts-blind-spots-and-ais-evolving-menace-20260503/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:00:05.060763+00:00</news:publication_date>
      <news:title>What to Watch This Week: Zero Trust's Blind Spots and AI's Evolving Menace</news:title>
      <news:keywords>AI, analysis, cybersecurity, predictions, ransomware, trends</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/story-retracted/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T07:43:56.215672+00:00</news:publication_date>
      <news:title>Exploit Chain Unleashed: Zero-Days Cascade</news:title>
      <news:keywords>cybersecurity, exploit chain, sandbox bypass, threat intelligence, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-03-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T07:00:01.958223+00:00</news:publication_date>
      <news:title>Daily Briefing: May 03, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/five-things-we-took-away-from-gartner-srm-sydney-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T06:36:40.400043+00:00</news:publication_date>
      <news:title>Gartner Sydney: Security Budgets Shift to Resilience, Not Just 'Breach or Else'</news:title>
      <news:keywords>SecOps, business resilience, cybersecurity budgets, gartner, platform consolidation, srm sydney</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/experts-on-experts-the-2026-threat-landscape-is-moving-faster-than-defenders-expect/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:33:31.747920+00:00</news:publication_date>
      <news:title>2026 Threat Landscape: Attackers Faster Than Defenders</news:title>
      <news:keywords>2026 threat landscape, AI in cybersecurity, MFA, cybersecurity, threat acceleration, vulnerability exploitation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:30:47.196737+00:00</news:publication_date>
      <news:title>Criminal IP & ThreatQ: Merging IP Intel for Faster Investigations</news:title>
      <news:keywords>Criminal IP, IP reputation, Securonix, ThreatQ, cybersecurity, threat intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2026-41940-cpanel-whm-authentication-bypass/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:15:45.332836+00:00</news:publication_date>
      <news:title>cPanel Auth Bypass: 9.8 CVSS Flaw Exploited</news:title>
      <news:keywords>CVE-2026-41940, WHM, authentication bypass, cPanel, web hosting, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-success-illusion-how-cross-tenant-ropc-can-gaslight-your-soc-and-poison-data/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T19:17:56.732571+00:00</news:publication_date>
      <news:title>[Warning] 'Ghost Logins' Fool SIEMs, Tax SOC Teams</news:title>
      <news:keywords>SIEM, UEBA, azure ad, entra id, ropc, security logs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T18:11:32.869754+00:00</news:publication_date>
      <news:title>China Hackers Hit Asia Govts, NATO, Journalists [New Campaign]</news:title>
      <news:keywords>GLITTER CARP, SEQUIN CARP, SHADOW-EARTH-053, Trend Micro, china-linked hackers, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/if-ais-so-smart-why-does-it-keep-deleting-production-databases/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T16:39:16.336442+00:00</news:publication_date>
      <news:title>AI Deleting Data? It's Not AI, It's Bad Testing. [Analysis]</news:title>
      <news:keywords>AI agents, AI security, data loss, production databases, security testing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T16:11:14.579868+00:00</news:publication_date>
      <news:title>SaaS Extortion: Vishing & SSO Abuse Fueling Rapid Cyberattacks</news:title>
      <news:keywords>SSO abuse, SaaS security, cybercrime, data extortion, identity provider, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:01:38.030408+00:00</news:publication_date>
      <news:title>ConsentFix v3 Hits Azure: What It Means for You</news:title>
      <news:keywords>Azure, MFA bypass, account takeover, consentfix v3, cybersecurity, oauth</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/edtech-firm-instructure-confirms-data-breach-after-salesforce-instance-hack/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:48:28.446308+00:00</news:publication_date>
      <news:title>Instructure Suffers Salesforce Hack, Edtech Sector Under Fire</news:title>
      <news:keywords>ShinyHunters, data breach, edtech, instructure, salesforce, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/new-bluekit-phishing-kit-features-ai-assistant/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T12:07:46.783755+00:00</news:publication_date>
      <news:title>Bluekit Phishing Kit Adds AI Assistant, Threatens Real People</news:title>
      <news:keywords>AI, Bluekit, Varonis, cybersecurity, malware, phishing kit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/disneyland-now-uses-face-recognition-on-visitors/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:08:32.972508+00:00</news:publication_date>
      <news:title>Disney's New Face Tech: Creepy Surveillance or Convenient Entry?</news:title>
      <news:keywords>AI, NSA, biometric data, disneyland, face recognition, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/15-year-old-detained-over-french-govt-agency-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T10:14:23.515753+00:00</news:publication_date>
      <news:title>15-Year-Old Held in Massive French Gov Agency Data Breach</news:title>
      <news:keywords>ants, cybercrime, data breach, france titres, personal data, teen hacker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/metasploit-wrap-up-05012026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:47:57.766136+00:00</news:publication_date>
      <news:title>Metasploit 2026: AI Sees Your Exploits, New Linux LPE Lands</news:title>
      <news:keywords>Linux vulnerability, Metasploit, ai integration, copy fail, cve-2026-31431, local privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-02-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T07:00:01.996975+00:00</news:publication_date>
      <news:title>Daily Briefing: May 02, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/essential-data-sources-for-detection-beyond-the-endpoint/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:56:35.177748+00:00</news:publication_date>
      <news:title>Beyond the Endpoint: Are We Safe?</news:title>
      <news:keywords>SOC, Unit 42, attack surface, cloud security, data exfiltration, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation-across-cloud-environments/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:56:21.050610+00:00</news:publication_date>
      <news:title>Linux Root Exploit: Millions of Cloud Servers at Risk [CVE-2026-31431]</news:title>
      <news:keywords>CISA KEV, cloud security, cve-2026-31431, linux kernel, microsoft-defender, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/tune-in-the-future-of-ai-powered-vulnerability-discovery/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:55:18.762714+00:00</news:publication_date>
      <news:title>AI's Vuln-Pocalypse: Are Defenders Ready?</news:title>
      <news:keywords>AI in cybersecurity, CrowdStrike, threat intelligence, vuln-pocalypse, vulnerability discovery, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/76-of-all-crypto-stolen-in-2026-is-now-in-north-korea/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:47:26.344971+00:00</news:publication_date>
      <news:title>[2026] North Korea Crypto Thefts Hit 76% of Total Stolen</news:title>
      <news:keywords>AI, Lazarus Group, blockchain, cryptocurrency, cybercrime, north korea</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/dangerous-new-linux-exploit-gives-attackers-root-access-to-countless-computers/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:41:41.292605+00:00</news:publication_date>
      <news:title>Linux Root Exploit: Attackers Gain Unfettered Access</news:title>
      <news:keywords>copyfail, cve-2026-31431, linux exploit, linux security, privilege escalation, root access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T19:29:50.824487+00:00</news:publication_date>
      <news:title>30,000 Facebook Accounts Hacked: Google AppSheet Abuse Exposed</news:title>
      <news:keywords>account compromise, accountdumpling, cybercrime, facebook phishing, google appsheet, telegram</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-18/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T18:14:31.843273+00:00</news:publication_date>
      <news:title>AI Unleashed: The Week of Digital Empires and Devastating Hacks</news:title>
      <news:keywords>SAP, crypto fraud, cyberespionage, npm packages, social media scams, supply chain attack</news:keywords>
    </news:news>
  </url>
</urlset>
