<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://threatdigest.io/article/mastering-agentic-ai-security-through-exposure-management/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:57:32.469062+00:00</news:publication_date>
      <news:title>AI Agents: The New Cyber Frontier</news:title>
      <news:keywords>AI security, agentic AI, autonomous ai, cyber risk, exposure management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/copy-fail-cve-2026-31431-frequently-asked-questions-about-linux-kernel-privilege-escalation-vulnerability/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:56:47.299602+00:00</news:publication_date>
      <news:title>Copy Fail: Linux Kernel Root Exploit Targets 7 Years of Code</news:title>
      <news:keywords>copy fail, cve-2026-31431, linux kernel, privilege escalation, root access, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/actively-exploited-cpanel-bug-exposes-millions-of-websites-to-takeover/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:54:18.564785+00:00</news:publication_date>
      <news:title>cPanel Exploit: Millions of Sites Vulnerable to Takeover [Urgent Update]</news:title>
      <news:keywords>CVE-2026-41940, WHM, authentication bypass, cPanel, vulnerability, website takeover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/8-best-practices-for-cisos-conducting-risk-reviews/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:53:21.941092+00:00</news:publication_date>
      <news:title>[Microsoft CISO] 8 Risk Review Best Practices</news:title>
      <news:keywords>CISO best practices, cybersecurity strategy, microsoft-security, risk reviews</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/anti-ddos-firm-heaped-attacks-on-brazilian-isps/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:43:49.666903+00:00</news:publication_date>
      <news:title>DDoS Firm Accused of Launching Attacks It Should Prevent</news:title>
      <news:keywords>botnet, brazil, ddos, huge networks, isp, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/this-month-in-security-with-tony-anscombe-april-2026-edition/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:36:13.895144+00:00</news:publication_date>
      <news:title>AI's Silent Takeover: Security Shake-Up in April 2026</news:title>
      <news:keywords>AI security, Iranian hackers, Rockwell PLCs, critical infrastructure, cybercrime statistics, helpdesk scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bridging-the-gap-how-to-integrate-claude-security-into-the-tenable-one-exposure-management-platform/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:32:19.967774+00:00</news:publication_date>
      <news:title>Claude Security Joins Tenable One: Is AI Vulnerability Noise Finally Contained?</news:title>
      <news:keywords>AI in Security, Claude Security, Code Security, Tenable One, exposure management, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/hackers-stole-hundreds-of-thousands-of-roblox-accounts-heres-what-to-do/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:28:03.626186+00:00</news:publication_date>
      <news:title>Roblox Hackers Stole 610K Accounts in $225K Scheme</news:title>
      <news:keywords>account theft, cybercrime, cybersecurity, data breach, infostealer, infostealer malware, malware, roblox</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/whats-new-updated-or-recently-released-in-microsoft-security/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:25:51.177877+00:00</news:publication_date>
      <news:title>Microsoft Rolls Out AI Agent Security Tools [Agent 365]</news:title>
      <news:keywords>AI security, agent 365, github advanced security, microsoft purview, microsoft-defender, microsoft-security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/nsa-chief-during-snowden-affair-shares-regrets-reflections-13-years-later/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:25:10.139091+00:00</news:publication_date>
      <news:title>NSA Snowden Leaks: Ex-Chief's 13-Year Regrets</news:title>
      <news:keywords>Chris Inglis, NSA, Snowden, intelligence, privacy, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-quarter-of-healthcare-organizations-report-medical-device-cyber-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:24:41.894237+00:00</news:publication_date>
      <news:title>Medical Device Cyber-Attacks: 1 in 4 Healthcare Firms Hit</news:title>
      <news:keywords>ai in healthcare, cybersecurity risks, healthcare cyber attacks, legacy equipment, medical device cybersecurity, runsafe security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-german-cyber-criminal-uberfall-shifts-in-europes-data-leak-landscape/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T10:29:56.610398+00:00</news:publication_date>
      <news:title>Germany's Cyber Uprising: Data Leaks Surge 92% in 2025</news:title>
      <news:keywords>cyber extortion, cybercrime, data leaks, germany, mittelstand, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-may-01-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T07:00:02.041929+00:00</news:publication_date>
      <news:title>Daily Briefing: May 01, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/frontier-ai-reinforces-the-future-of-modern-cyber-defense/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T05:58:17.233758+00:00</news:publication_date>
      <news:title>AI Cyber Defense: Hype vs. Reality?</news:title>
      <news:keywords>OpenAI, SentinelOne, artificial intelligence, cyber defense, cybersecurity, frontier AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/snow-flurries-how-unc6692-employed-social-engineering-to-deploy-a-custom-malware-suite/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T05:49:46.087212+00:00</news:publication_date>
      <news:title>UNC6692 Malware Hijacks Teams, Turns Edge into Spy Tool</news:title>
      <news:keywords>autohotkey, browser extension, malware, microsoft teams, social engineering, unc6692</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-implementation-blind-spot-why-organizations-are-confusing-temporary-friction-with-permanent-safety/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T05:25:33.708782+00:00</news:publication_date>
      <news:title>AI Implementation Blind Spot: Why Friction Masks Risk [Analysis]</news:title>
      <news:keywords>AI adoption, AI implementation, cognitive rust belt, institutional knowledge, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/breaking-the-sound-barrier-part-ii-exploiting-cve-2024-54529/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:14:35.934122+00:00</news:publication_date>
      <news:title>macOS CoreAudio Exploit: Type Confusion Unpacked [Deep Dive]</news:title>
      <news:keywords>control flow hijacking, coreaudio, cve-2024-54529, exploit development, macos security, type confusion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/m-trends-2026-data-insights-and-strategies-from-the-frontlines/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:02:32.818082+00:00</news:publication_date>
      <news:title>M-Trends 2026: Dwell Time Jumps, Vishing Surges</news:title>
      <news:keywords>cyber threats, dwell time, m-trends 2026, mandiant, ransomware, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bypassing-administrator-protection-by-abusing-ui-access/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:03:32.086082+00:00</news:publication_date>
      <news:title>Windows UAC Bypass: 5 Flaws Found in UI Access</news:title>
      <news:keywords>Administrator Protection, security bypass, uac, ui access, vulnerability, windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/daily-briefing-april-30-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T07:00:02.118185+00:00</news:publication_date>
      <news:title>Daily Briefing: April 30, 2026</news:title>
      
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/bypassing-windows-administrator-protection/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:58:57.322251+00:00</news:publication_date>
      <news:title>[9 Bypasses] Windows 11 Admin Protection Cracked</news:title>
      <news:keywords>Administrator Protection, UAC bypass, Windows 11, privilege escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/thinking-outside-the-box-dusted-off-draft-from-2017/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:45:30.440168+00:00</news:publication_date>
      <news:title>VirtualBox Slirp Heap Flaw Enables VM Escape [2017 CVE]</news:title>
      <news:keywords>CVE-2017-3558, Slirp exploit, VM escape, VirtualBox vulnerability, heap corruption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/the-proliferation-of-darksword-ios-exploit-chain-adopted-by-multiple-threat-actors/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:31:54.465396+00:00</news:publication_date>
      <news:title>[DarkSword] iOS Exploit Chain Used by Multiple Threat Actors</news:title>
      <news:keywords>DarkSword, Google TAG, Google Threat Intelligence, iOS exploit, iOS exploits, state-sponsored actors, threat actors, zero-day vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://threatdigest.io/article/a-0-click-exploit-chain-for-the-pixel-9-part-1-decoding-dolby/</loc>
    <news:news>
      <news:publication>
        <news:name>Threat Digest</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:18:09.229361+00:00</news:publication_date>
      <news:title>[Pixel 9 0-Click Exploit Chain] Dolby Decoder Cracked</news:title>
      <news:keywords>0-click attack, Android security, Dolby CVE, Pixel 9 exploit, Project Zero</news:keywords>
    </news:news>
  </url>
</urlset>
