<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://threatdigest.io/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/grafana-patches-ai-bug-that-could-have-leaked-user-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-hidden-cost-of-recurring-credential-incidents/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/storm-1175-exploits-flaws-in-high-velocity-medusa-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-wants-to-transition-to-post-quantum-cryptography-by-2029/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/over-17bn-lost-to-cyber-fraud-in-the-last-year-warns-fbi/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropic-teams-up-with-its-rivals-to-keep-ai-from-hacking-everything/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cybersecurity-in-the-age-of-instant-software/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/critical-flowise-vulnerability-in-attacker-crosshairs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hong-kong-police-can-force-you-to-reveal-your-encryption-keys/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/automated-credential-harvesting-campaign-exploits-react2shell-flaw/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fortinet-issues-emergency-patch-for-forticlient-zero-day/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-assisted-supply-chain-attack-targets-github/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploited/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/support-platform-breach-exposes-hims-amp-hers-customer-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/webinar-today-why-automated-pentesting-alone-is-not-enough/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russian-apt28-hackers-hijack-routers-to-steal-credentials-uk-security-agency-warns/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/understanding-current-threats-to-kubernetes-environments/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/axios-attack-shows-complex-social-engineering-is-industrialized/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/a-week-in-security-march-30-8211-april-5/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-your-automated-pentesting-tool-just-hit-a-wall/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/us-warns-of-iranian-hackers-targeting-critical-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-mexicos-meta-ruling-and-encryption/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-simple-breach-monitoring-is-no-longer-enough/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/lies-damned-lies-and-cybersecurity-metrics/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/severe-strongbox-vulnerability-patched-in-android/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/shadow-ai-in-healthcare-is-here-to-stay/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/how-often-are-redirects-used-in-phishing-in-2026x3f-mon-apr-6th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/grafanaghost-exploit-bypasses-ai-guardrails-for-silent-data-exfiltration/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-new-rules-of-engagement-matching-agentic-attack-speed/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/focusing-on-the-people-in-cybersecurity-at-rsac-2026-conference/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/owasp-genai-security-project-gets-update-new-tools-matrix/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/german-authorities-identify-revil-and-gandcrab-ransomware-bosses/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/shinyhunters-anodot-heist-dozens-of-snowflake-customers-drained-of-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/quizlet-flashcards-spill-cbp-checkpoint-door-codes-in-texas/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/eu-cloud-hack-stolen-aws-key-exposes-30-entities-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-korean-hackers-hijack-drifts-governance-wipe-out-280-million-in-user-funds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-april-1-deadline-puts-apple-google-in-crosshairs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/0ktapus-phishing-snags-10000-credentials-across-130-companiesyour-mfa-is-the-weak-link/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chromes-fifth-zero-day-patch-google-races-against-relentless-exploits/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/unified-exposure-management-ai-hype-or-real-shield/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irgc-puts-apple-google-tesla-on-middle-east-hit-list-for-april-1-attacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/80000-hikvision-cameras-exposed-cybercriminals-auction-off-access/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/84-of-attacks-hijack-your-own-tools-and-youre-still-blind/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/whatsapps-vbs-malware-sneaks-past-uac-microsoft-says-and-were-not-impressed/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/twitters-hidden-rot-mudges-security-indictment/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/lockbits-ransomware-rampage-reignites-the-fire/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/whatsapps-spyware-scare-200-ios-users-hit-by-italian-fake-app-firm-in-the-crosshairs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apple-finally-backports-darksword-fix-to-ios-18but-dont-call-it-mercy/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chromes-fourth-zero-day-this-year-dawns-deadly-flaw/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-fake-cert-ua-to-push-agewheeze-rat-at-a-million-ukrainians/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iranian-hackers-nab-fbi-directors-old-gmailfbi-systems-hold-firm/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/claude-code-leak-hands-rivals-ais-secret-sauce/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/doctor-nos-demise-block-prompts-not-productivity/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/honeypots-snag-vite-probes-hunting-aws-keys-on-exposed-dev-servers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/vertex-ais-hidden-backdoor-how-default-permissions-betray-google-cloud-users/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ice-wires-122k-to-buy-a-tiny-nh-towns-entire-police-force/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-late-darksword-shield-hits-old-iphones-skeptics-wonder-if-its-enough/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-zero-day-double-whammy-iphone-owners-patch-up-or-perish/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sharefile-backdoors-android-rootkits-and-fbi-warnings-inside-this-weeks-threatsday-bulletin/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-batch-script-that-scrubs-windows-ads-to-ghost-malware-persistence/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/215m-for-ai-that-hunts-compliance-ghosts-variances-big-swing/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crystalx-rat-telegrams-new-toy-for-spying-stealing-and-pranks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/quantum-cryptographys-inventors-snag-turing-awardbut-does-it-fix-anything-real/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/trueconfs-poisoned-updates-infect-southeast-asian-gov-networks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/casbaneiro-gangs-sneaky-dynamic-pdfs-hit-enterprises-in-latam-and-europe/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/three-china-aligned-hack-clusters-pile-onto-one-southeast-asian-government-network/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/depthfirsts-80m-sprint-why-ai-security-models-are-racing-to-smart-contracts/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-cloud-authenticator-the-cloud-brain-powering-your-passwordless-future-and-its-sneaky-vulnerabilities/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/palo-altos-firewall-glitch-hits-cisas-fix-now-list-after-real-world-attacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ciscos-98-flaws-hand-attackers-server-keys-and-root-access/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/clawdbots-meteoric-rise-exposes-ai-agents-hidden-security-perils/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-unhackable-camera-glow-the-hardware-trick-malware-cant-touch/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/securitys-wild-week-phone-rentals-stealer-swarms-and-metas-reckoning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/gcp-vertex-ais-hidden-trap-how-ai-agents-become-corporate-double-agents/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fake-avast-site-runs-bogus-scan-drops-venom-stealer-on-naive-users/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/linx-securitys-50m-gamble-on-ai-identity-wrangling/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/claude-codes-50-command-cap-the-bypass-that-unlocks-your-dev-machine/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-supply-chain-onslaught-hits-databricks-splits-ransomware-into-two-deadly-tracks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cybersecuritys-ma-frenzy-hits-38-deals-in-march-2026-ai-hype-or-real-muscle/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ref1695s-iso-trick-9k-crypto-haul-from-fake-installers-and-rats/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/brain-hack-taxonomy-five-layers-where-reality-crumbles/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/nelnets-student-loan-breach-25-million-ssns-loose-in-forgiveness-feeding-frenzy/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-koreas-unc1069-turns-axios-npm-into-cross-platform-trapdoor/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/meta-safety-boss-races-to-stop-openclaw-from-wiping-her-inbox/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackbacks-dawn-us-cyber-strategy-greenlights-corporate-counterstrikes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fbi-cisa-blast-russian-phishers-hijacking-signal-and-whatsapp-accounts-worldwide/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/maryland-coders-53m-defi-heist-ends-in-handcuffs-after-four-year-hunt/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/nacogdoches-hospital-breach-exposes-250k-patients-ssns/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ciscos-exposed-apis-root-access-via-one-bad-request-in-ssm-on-prem/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/red-ladon-poisons-australian-news-sites-with-scanbox-keyloggers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/wiper-attacks-from-iran-the-digital-eradication-wave-hitting-now/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/agentic-ai-agents-are-poised-to-hijack-your-holiday-gift-cards/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/deepload-malware-ai-powered-clickfix-scam-thats-already-stealing-enterprise-logins/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-surprise-ios-1877-rollout-shields-older-iphones-from-darksword-onslaught/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/mercor-breach-exposes-teampcps-litellm-rampage-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/qr-code-traps-and-ghost-joins-inside-the-ncscs-warning-on-whatsapp-and-signal-hacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/pixel-9-cracked-open-bigwave-drivers-triple-bug-sandbox-escape/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/78-of-uk-factories-cyber-slammed-last-year-boards-yawn/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/boggy-serpens-four-wave-siege-on-middle-east-energy/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/malwarebytes-vpn-audit-exposes-critical-flaws-but-fixes-are-flying/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/scammers-hijack-palo-altos-name-to-extort-execs-over-fake-resume-fees/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/axios-npm-poisoning-hackers-hijack-your-dev-secrets-via-100m-downloads/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/766-nextjs-servers-gutted-by-cve-2025-55182-hackers-snag-keys-secrets-and-your-whole-damn-infra-map/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/mercors-4tb-nightmare-litellms-supply-chain-poison-reaches-ai-hiring-giant/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/infiniti-stealer-macoss-sneaky-new-thief-via-fake-captcha-and-terminal-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/inside-the-axios-hijack-how-dprk-rats-slipped-into-dev-workflows-worldwide/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-malware-all-sizzle-no-real-steak-yet/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chinas-silent-siege-on-southeast-asias-militaries/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/axios-npm-breach-north-koreas-precision-strike-on-js-devs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hasbros-breach-weeks-of-chaos-ahead/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-are-chunking-data-to-dodge-your-next-gen-firewalls-app-id-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-terminal-lifeline-macos-now-blocks-clickfix-paste-bombs-before-they-explode/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cisos-bet-big-on-ai-security-toolsbut-whos-cashing-in/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/prompt-fuzzing-tears-through-llm-guardrails-evasion-hits-highs-across-open-and-closed-models/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/latin-americas-digital-frontlines-governments-bracing-for-cyber-onslaught/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crowdstrikes-bold-bet-taming-ai-agents-before-they-backfire-on-endpoints/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/glassworms-stealthy-crawl-fake-extensions-and-blockchain-c2-turn-dev-tools-into-spyware-nightmares/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/leaked-us-iphone-hack-tool-turns-your-phone-into-a-spy-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/feds-smash-four-iot-botnets-that-powered-ddos-attacks-big-enough-to-black-out-the-dod/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsofts-march-2026-patch-tuesday-drops-77-fixes-including-ai-spotted-criticals-but-heres-why-it-cant-snooze/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cve-2026-20929-hackers-hijack-your-certs-with-dns-cname-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/us-router-ban-foreign-gear-out-prices-up-security-gamble-in/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cloud-phones-let-crooks-rent-victim-mimics-for-pennies-dodging-bank-defenses/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-vertex-ai-lets-ai-agents-roam-free-palo-altos-wake-up-call/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/pixel-9s-silent-killer-0-click-exploits-via-obscure-audio-codecs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/millions-of-crime-tips-leaked-the-hack-that-shatters-anonymous-reporting/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/five-ways-ui-access-cracked-windows-admin-protection-before-it-even-launched/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/scattered-lapsus-shinyhunters-paying-them-just-buys-more-swats-and-threats/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iranian-hackers-erase-strykers-digital-lifeline-medtechs-nightmare-begins/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/f5-big-ip-rce-bug-sparks-patch-panic/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-code-boom-overwhelms-appsec-black-duck-ceo-sounds-alarm/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/kimwolf-botnets-accidental-i2p-siege-a-sybil-flood-exposes-anonymitys-fragile-core/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/venom-stealer-the-malware-that-turns-one-time-heists-into-endless-data-streams/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-rare-lifeline-to-old-iphones-dodging-darkswords-web-traps/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/deepload-ais-junk-code-arsenal-redefines-malware-stealth/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/canisterworm-cybercrooks-hijack-iran-tensions-for-cloud-data-heists/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-korea-poisons-axios-npm-with-rats-in-bold-supply-chain-hit/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/residential-proxies-ghost-past-ip-defenses-in-78-of-4-billion-attacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-hackers-swap-wipers-for-identity-strikes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/100-tax-scams-flood-inboxes-in-early-2026-criminals-get-sneakier/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/latams-hidden-cyber-wizards-self-taught-talent-ready-to-crush-the-attack-wave/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-credential-blitz-aws-and-azure-fall-in-hours-not-days/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/employee-data-breaches-hit-uk-seven-year-highblame-the-hybrid-hustle/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-27-day-blackout-fuels-global-phishing-frenzy-and-wiper-warnings/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-late-darksword-patch-hits-more-iphones-too-little-too-late/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-turn-github-into-malwares-secret-batphonesouth-korea-in-the-crosshairs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/dort-the-minecraft-cheat-kid-running-kimwolfs-mayhem/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-ruthless-hijack-of-security-scanners-500k-machines-300gb-stolen/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/eviltokens-phishings-drag-and-drop-nightmare-for-microsoft-logins/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-darksword-panic-patch-why-your-old-iphone-just-got-a-lifeline/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/airsnitch-wi-fis-encryption-shield-cracked-from-the-inside/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/storm-infostealer-hackers-now-decrypt-your-passwords-on-their-servers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/akira-ransomware-full-attack-in-under-60-minutes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/starkiller-the-proxy-that-turns-real-logins-into-criminal-goldmines/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/whisperpair-exposes-google-fast-pair-headphones-to-eavesdroppers-everywhere/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-stolen-secrets-pipeline-fueling-ransomware-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/claude-codes-epic-leak-turns-github-into-a-malware-minefield/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-hackers-dust-off-pay2key-fake-ransomware-real-chaos/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-android-16-drops-a-digital-fortress-for-journalists-and-politicians-under-siege/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/drift-protocols-280m-governance-hijack-exposes-defis-multisig-weak-spot/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsofts-february-2026-patch-tuesday-plugs-six-actively-exploited-zero-days/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/project-zeros-blog-glow-up-old-exploits-still-fresh-as-yesterdays-zero-day/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/uk-power-grids-and-factories-on-the-brink-5m-ot-downtime-nightmares-hit-80-of-cni-firms/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/pixel-9s-dolby-decoder-the-0-click-path-project-zero-just-paved-wide-open/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/rsac-2026-exposes-ais-dark-side-in-a-fractured-geopolitical-world/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/windows-11-admin-protection-bypassednine-times-over/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/novoice-malwares-rampage-23-million-android-phones-rooted-via-google-play/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/clorox-sues-vendor-for-coughing-up-passwords-in-380m-hack-fiasco/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sharefiles-hidden-backdoor-how-two-flaws-chain-into-pre-auth-rce-hell/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cisco-imcs-password-change-flaw-hands-attackers-the-keys-to-your-servers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-gmail-breach-panic-25-billion-users-safe-but-phishings-still-raging/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-cybersecuritys-ai-is-stuck-learning-yesterdays-threats/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/leaked-cellebrite-matrix-names-pixel-6-9-models-ripe-for-hacking/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/1500-whatsapp-engineers-had-unrestricted-access-to-user-data-whistleblower-alleges/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ta416-strikes-back-chinese-espionage-floods-european-diplomats-inboxes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chatgpts-one-prompt-data-heist-your-secrets-just-got-leaky/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-and-quantum-are-gutting-digital-trust-time-to-panic/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/27-seconds-to-breach-crowdstrikes-charlotte-ai-hype-check/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/virtualboxs-dusty-2017-heap-hack-guests-storming-the-host-via-slirp-shenanigans/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crowdstrikes-flex-for-services-flexible-fix-or-sticky-upsell/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-toxins-dodge-dna-screeners-microsofts-wake-up-call-on-biological-zero-days/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/getprocesshandlefromhwnd-windows-apis-lies-fuel-uac-bypasses/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/rsac-2026-ai-hype-meets-human-reality-in-cybersecurity/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/darksword-the-iphone-killer-now-lurking-on-legit-websites/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/shattering-macos-defenses-cve-2024-54529-exploit-unleashed/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/trueconf-zero-day-lets-hackers-hijack-meetings-for-malware-drops/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/stryker-recovers-from-iranian-data-wipeout-in-record-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/f5-big-ips-cve-2025-53521-dos-flaw-morphs-into-rce-weapon-already-hitting-the-wild/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crowdstrikes-falcon-data-security-taming-datas-borderless-dash/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hospitals-are-ransomware-baitmock-drills-could-be-their-lifeline/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crystalrat-malware-that-flips-your-screen-while-stealing-your-data/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crooks-scout-zillow-for-vacant-houses-to-hijack-your-mail/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/venom-stealer-maas-makes-clickfix-attacks-dirt-cheap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/your-everyday-login-is-now-hackers-front-door-to-chaos/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/14000-f5-big-ip-doors-wide-open-to-rce-nightmares/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-developer-verification-plan-buries-androids-open-roots/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/pt-br/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/data-breaches/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/vulnerabilities/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/ransomware-malware/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/nation-state/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/security-tools/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/compliance-policy/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/cloud-security/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/threat-intel/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/about/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/privacy/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/terms/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/tools/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/advertise/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url>
</urlset>
