<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://threatdigest.io/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-15/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/edge-decay-how-a-failing-perimeter-is-fueling-modern-intrusions/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/a-laughing-rat-crystalx-combines-spyware-stealer-and-prankware-features/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/metasploit-wrap-up-03202026/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-soc-files-time-to-sapecar-unpacking-a-new-horabot-campaign-in-mexico/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/from-vectors-to-verdicts-web-app-testing-with-vector-command/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-whitepaper-exploiting-cellular-based-iot-devices/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/a-first-look-at-our-speaker-lineup-and-agenda-for-the-rapid7-2026-global-cybersecurity-summit/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/negotiating-with-the-board-translating-active-risk-into-financial-exposure/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/free-real-estate-gopix-the-banking-trojan-living-off-your-memory/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/whats-new-in-rapid7-products-and-services-q1-2026-in-review/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/exploits-and-vulnerabilities-in-q4-2025/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/an-ai-gateway-designed-to-steal-your-data/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/what-cisos-should-expect-from-ai-powered-mdr-in-2026-according-to-rapid7-ceo-corey-thomas/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-threat-to-critical-infrastructure-has-changed-has-your-readiness/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/you-dont-have-a-security-problem-you-have-a-visibility-problem/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anatomy-of-a-cyber-world-global-report-2026/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/red-teaming-in-2026-what-to-expect-at-our-2026-global-cybersecurity-summit/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/inside-an-aienabled-device-code-phishing-campaign/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/aurainspector-auditing-salesforce-aura-for-data-exposure/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/bpfdoor-in-telecom-networks-sleeper-cells-in-the-backbone/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/intent-redirection-vulnerability-in-third-party-sdk-exposed-millions-of-android-wallets-to-potential-risk/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cookie-controlled-php-webshells-a-stealthy-tradecraft-in-linux-hosting-environments/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-agentic-socrethinking-secops-for-the-next-decade/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/closing-the-door-on-net-ntlmv1-releasing-rainbow-tables-to-accelerate-protocol-deprecation/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/exposing-the-undercurrent-disrupting-the-gridtide-global-cyber-espionage-campaign/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/metasploit-wrap-up-03272026/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-whitepaper-stealthy-bpfdoor-variants-are-a-needle-that-looks-like-hay/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cve-2026-3055-citrix-netscaler-adc-and-netscaler-gateway-out-of-bounds-read/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/initial-access-brokers-have-shifted-to-high-value-targets-and-premium-pricing/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/gtig-ai-threat-tracker-distillation-experimentation-and-continued-integration-of-ai-for-adversarial-use/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/threat-actor-abuse-of-ai-accelerates-from-tool-to-cyberattack-surface/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/what-project-glasswing-means-for-security-leaders/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/financial-cyberthreats-in-2025-and-the-outlook-for-2026/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/coruna-the-framework-used-in-operation-triangulation/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/rapid7-completes-bsi-c5-type-2-examination-stronger-cloud-security-for-dach-organizations/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/proactive-preparation-and-hardening-against-destructive-attacks-2026-edition/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/integrating-advanced-api-security-with-imperva-gateway-environment/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/react2dos-cve-2026-23869-when-the-flight-protocol-crashes-at-takeoff/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/metasploit-wrap-up-04102026/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ransomware-under-pressure-tactics-techniques-and-procedures-in-a-shifting-threat-landscape/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/guidance-from-the-frontlines-proactive-defense-against-shinyhunters-branded-data-theft-targeting-saas/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/metasploit-wrap-up-04032026/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-cvss-is-no-longer-enough-for-exposure-management/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/16th-march-threat-intelligence-report/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-korea-nexus-threat-actor-compromises-widely-used-axios-npm-package-in-supply-chain-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-most-ddos-protection-fails-solving-for-continuity-and-resilience/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fortigate-cve-2025-59718-exploitation-incident-response-findings/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/look-what-you-made-us-patch-2025-zero-days-in-review/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/silver-dragon-targets-organizations-in-southeast-asia-and-europe/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/2025-the-untold-stories-of-check-point-research/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-proliferation-of-darksword-ios-exploit-chain-adopted-by-multiple-threat-actors/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/23rd-march-threat-intelligence-report/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/coruna-the-mysterious-journey-of-a-powerful-ios-exploit-kit/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/n8n-shared-credentials-and-account-takeover/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/vishing-for-access-tracking-the-expansion-of-shinyhunters-branded-saas-data-theft/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/multiple-threat-actors-exploit-react2shell-cve-2025-55182/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/caught-in-the-hook-rce-and-api-token-exfiltration-through-claude-code-project-files-cve-2025-59536-cve-2026-21852/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-ai-bot-protection-and-control-are-essential-for-application-security/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/from-brickstorm-to-grimbolt-unc6201-exploiting-a-dell-recoverpoint-for-virtual-machines-zero-day/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cloud-based-waf-upload-scan-and-control-the-new-standard-for-file-upload-security/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/no-place-like-home-network-disrupting-the-worlds-largest-residential-proxy-network/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/2nd-march-threat-intelligence-report/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/api-security-for-ai-agents-why-protection-has-never-been-more-important/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/m-trends-2026-data-insights-and-strategies-from-the-frontlines/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/beyond-the-battlefield-threats-to-the-defense-industrial-base/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/30th-march-threat-intelligence-report/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/a-new-denial-of-service-vector-in-react-server-components/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/vsphere-and-brickstorm-malware-a-defenders-guide/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iranian-mois-actors-the-cyber-crime-connection/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-threat-landscape-digest-january-february-2026/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/9th-march-threat-intelligence-report/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/when-your-ddos-mitigation-provider-goes-down-why-traffic-control-cant-be-outsourced/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/handala-hack-unveiling-groups-modus-operandi/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/6th-april-threat-intelligence-report/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/obfuscated-javascript-or-nothing-thu-apr-9th/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/mitre-releases-fight-fraud-framework/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russias-fancy-bear-apt-continues-its-global-onslaught/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/more-honeypot-fingerprinting-scans-wed-apr-8th/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fake-claude-site-installs-malware-that-gives-attackers-access-to-your-computer/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/do-ceasefires-slow-cyberattacks-history-suggests-not/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/atomic-stealer-macos-clickfix-attack-bypasses-apple-security-warnings/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/on-microsofts-lousy-cloud-security/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/juniper-networks-patches-dozens-of-junos-os-vulnerabilities/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/bluehammer-windows-zero-day-exploit-signals-microsoft-bug-disclosure-issues/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcp-supply-chain-campaign-update-007-cisco-source-code-stolen-via-trivy-linked-breach-google-gtig-tracks-teampcp-as-unc6780-and-cisa-kev-deadline-arrives-with-no-standalone-advisory-wed-apr-8th/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/webinar-from-noise-to-signal-what-threat-actors-are-targeting-next/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/middle-east-hack-for-hire-operation-traced-to-south-asian-cyber-espionage-group/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsoft-finds-vulnerability-exposing-millions-of-android-crypto-wallet-users/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russian-hacking-group-targets-home-and-small-office-routers-to-spy-on-users/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/just-three-ransomware-gangs-accounted-for-40-of-attacks-last-month/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/healthcare-it-solutions-provider-chipsoft-hit-by-ransomware-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/us-thwarts-dns-hijacking-network-controlled-by-russian-apt28-hackers/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/number-usage-in-passwords-take-two-thu-apr-9th/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/bitcoin-depot-reports-36m-crypto-theft-after-system-breach/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iranbacked-threat-actors-hit-us-cni-providers-via-internetfacing-ot-assets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/claude-discovers-apache-activemq-bug-hidden-for-13-years/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/when-attackers-already-have-the-keys-mfa-is-just-another-door-to-open/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/in-other-news-cyberattack-stings-stryker-windows-zero-day-china-supercomputer-hack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/can-anthropic-keep-its-exploit-writing-ai-out-of-the-wrong-hands/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cpuid-hacked-to-deliver-malware-via-cpu-z-hwmonitor-downloads/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-warns-of-new-threat-group-targeting-bpos-and-helpdesks/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/critical-vulnerability-in-ninja-forms-exposes-wordpress-sites/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/critical-marimo-flaw-exploited-hours-after-public-disclosure/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/threat-actors-get-crafty-with-emojis-to-escape-detection/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russias-forest-blizzard-nabs-rafts-of-logins-via-soho-routers/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cracks-in-the-bedrock-agent-god-mode/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/nearly-4000-us-industrial-devices-exposed-to-iranian-cyberattacks/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-chrome-adds-infostealer-protection-against-session-cookie-theft/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hims-breach-exposes-the-most-sensitive-kinds-of-phi/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iranian-threat-actors-disrupt-us-critical-infrastructure-via-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/grafana-patches-ai-bug-that-could-have-leaked-user-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-hidden-cost-of-recurring-credential-incidents/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/storm-1175-exploits-flaws-in-high-velocity-medusa-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-wants-to-transition-to-post-quantum-cryptography-by-2029/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/over-17bn-lost-to-cyber-fraud-in-the-last-year-warns-fbi/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropic-teams-up-with-its-rivals-to-keep-ai-from-hacking-everything/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cybersecurity-in-the-age-of-instant-software/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/critical-flowise-vulnerability-in-attacker-crosshairs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hong-kong-police-can-force-you-to-reveal-your-encryption-keys/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/automated-credential-harvesting-campaign-exploits-react2shell-flaw/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fortinet-issues-emergency-patch-for-forticlient-zero-day/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-assisted-supply-chain-attack-targets-github/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploited/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/support-platform-breach-exposes-hims-amp-hers-customer-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/webinar-today-why-automated-pentesting-alone-is-not-enough/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russian-apt28-hackers-hijack-routers-to-steal-credentials-uk-security-agency-warns/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/understanding-current-threats-to-kubernetes-environments/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/axios-attack-shows-complex-social-engineering-is-industrialized/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/a-week-in-security-march-30-8211-april-5/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-your-automated-pentesting-tool-just-hit-a-wall/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/us-warns-of-iranian-hackers-targeting-critical-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-mexicos-meta-ruling-and-encryption/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-simple-breach-monitoring-is-no-longer-enough/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/lies-damned-lies-and-cybersecurity-metrics/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/severe-strongbox-vulnerability-patched-in-android/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/shadow-ai-in-healthcare-is-here-to-stay/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/how-often-are-redirects-used-in-phishing-in-2026x3f-mon-apr-6th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/grafanaghost-exploit-bypasses-ai-guardrails-for-silent-data-exfiltration/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-new-rules-of-engagement-matching-agentic-attack-speed/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/focusing-on-the-people-in-cybersecurity-at-rsac-2026-conference/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/owasp-genai-security-project-gets-update-new-tools-matrix/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/german-authorities-identify-revil-and-gandcrab-ransomware-bosses/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/shinyhunters-anodot-heist-dozens-of-snowflake-customers-drained-of-data/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/quizlet-flashcards-spill-cbp-checkpoint-door-codes-in-texas/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/eu-cloud-hack-stolen-aws-key-exposes-30-entities-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-korean-hackers-hijack-drifts-governance-wipe-out-280-million-in-user-funds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-april-1-deadline-puts-apple-google-in-crosshairs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/0ktapus-phishing-snags-10000-credentials-across-130-companiesyour-mfa-is-the-weak-link/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chromes-fifth-zero-day-patch-google-races-against-relentless-exploits/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/unified-exposure-management-ai-hype-or-real-shield/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irgc-puts-apple-google-tesla-on-middle-east-hit-list-for-april-1-attacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/80000-hikvision-cameras-exposed-cybercriminals-auction-off-access/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/84-of-attacks-hijack-your-own-tools-and-youre-still-blind/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/whatsapps-vbs-malware-sneaks-past-uac-microsoft-says-and-were-not-impressed/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/twitters-hidden-rot-mudges-security-indictment/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/lockbits-ransomware-rampage-reignites-the-fire/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/whatsapps-spyware-scare-200-ios-users-hit-by-italian-fake-app-firm-in-the-crosshairs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apple-finally-backports-darksword-fix-to-ios-18but-dont-call-it-mercy/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chromes-fourth-zero-day-this-year-dawns-deadly-flaw/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-fake-cert-ua-to-push-agewheeze-rat-at-a-million-ukrainians/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iranian-hackers-nab-fbi-directors-old-gmailfbi-systems-hold-firm/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/claude-code-leak-hands-rivals-ais-secret-sauce/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/doctor-nos-demise-block-prompts-not-productivity/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/honeypots-snag-vite-probes-hunting-aws-keys-on-exposed-dev-servers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/vertex-ais-hidden-backdoor-how-default-permissions-betray-google-cloud-users/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ice-wires-122k-to-buy-a-tiny-nh-towns-entire-police-force/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-late-darksword-shield-hits-old-iphones-skeptics-wonder-if-its-enough/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-zero-day-double-whammy-iphone-owners-patch-up-or-perish/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sharefile-backdoors-android-rootkits-and-fbi-warnings-inside-this-weeks-threatsday-bulletin/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/the-batch-script-that-scrubs-windows-ads-to-ghost-malware-persistence/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/215m-for-ai-that-hunts-compliance-ghosts-variances-big-swing/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crystalx-rat-telegrams-new-toy-for-spying-stealing-and-pranks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/quantum-cryptographys-inventors-snag-turing-awardbut-does-it-fix-anything-real/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/trueconfs-poisoned-updates-infect-southeast-asian-gov-networks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/casbaneiro-gangs-sneaky-dynamic-pdfs-hit-enterprises-in-latam-and-europe/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/three-china-aligned-hack-clusters-pile-onto-one-southeast-asian-government-network/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/depthfirsts-80m-sprint-why-ai-security-models-are-racing-to-smart-contracts/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/google-cloud-authenticator-the-cloud-brain-powering-your-passwordless-future-and-its-sneaky-vulnerabilities/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/palo-altos-firewall-glitch-hits-cisas-fix-now-list-after-real-world-attacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ciscos-98-flaws-hand-attackers-server-keys-and-root-access/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/clawdbots-meteoric-rise-exposes-ai-agents-hidden-security-perils/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-unhackable-camera-glow-the-hardware-trick-malware-cant-touch/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/securitys-wild-week-phone-rentals-stealer-swarms-and-metas-reckoning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/gcp-vertex-ais-hidden-trap-how-ai-agents-become-corporate-double-agents/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fake-avast-site-runs-bogus-scan-drops-venom-stealer-on-naive-users/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/linx-securitys-50m-gamble-on-ai-identity-wrangling/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/claude-codes-50-command-cap-the-bypass-that-unlocks-your-dev-machine/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-supply-chain-onslaught-hits-databricks-splits-ransomware-into-two-deadly-tracks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cybersecuritys-ma-frenzy-hits-38-deals-in-march-2026-ai-hype-or-real-muscle/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ref1695s-iso-trick-9k-crypto-haul-from-fake-installers-and-rats/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/brain-hack-taxonomy-five-layers-where-reality-crumbles/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/nelnets-student-loan-breach-25-million-ssns-loose-in-forgiveness-feeding-frenzy/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-koreas-unc1069-turns-axios-npm-into-cross-platform-trapdoor/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/meta-safety-boss-races-to-stop-openclaw-from-wiping-her-inbox/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackbacks-dawn-us-cyber-strategy-greenlights-corporate-counterstrikes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/fbi-cisa-blast-russian-phishers-hijacking-signal-and-whatsapp-accounts-worldwide/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/maryland-coders-53m-defi-heist-ends-in-handcuffs-after-four-year-hunt/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/nacogdoches-hospital-breach-exposes-250k-patients-ssns/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ciscos-exposed-apis-root-access-via-one-bad-request-in-ssm-on-prem/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/red-ladon-poisons-australian-news-sites-with-scanbox-keyloggers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/wiper-attacks-from-iran-the-digital-eradication-wave-hitting-now/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/agentic-ai-agents-are-poised-to-hijack-your-holiday-gift-cards/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/deepload-malware-ai-powered-clickfix-scam-thats-already-stealing-enterprise-logins/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-surprise-ios-1877-rollout-shields-older-iphones-from-darksword-onslaught/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/mercor-breach-exposes-teampcps-litellm-rampage-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/qr-code-traps-and-ghost-joins-inside-the-ncscs-warning-on-whatsapp-and-signal-hacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/pixel-9-cracked-open-bigwave-drivers-triple-bug-sandbox-escape/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/78-of-uk-factories-cyber-slammed-last-year-boards-yawn/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/boggy-serpens-four-wave-siege-on-middle-east-energy/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/malwarebytes-vpn-audit-exposes-critical-flaws-but-fixes-are-flying/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/scammers-hijack-palo-altos-name-to-extort-execs-over-fake-resume-fees/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/axios-npm-poisoning-hackers-hijack-your-dev-secrets-via-100m-downloads/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/766-nextjs-servers-gutted-by-cve-2025-55182-hackers-snag-keys-secrets-and-your-whole-damn-infra-map/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/mercors-4tb-nightmare-litellms-supply-chain-poison-reaches-ai-hiring-giant/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/infiniti-stealer-macoss-sneaky-new-thief-via-fake-captcha-and-terminal-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/inside-the-axios-hijack-how-dprk-rats-slipped-into-dev-workflows-worldwide/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-malware-all-sizzle-no-real-steak-yet/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chinas-silent-siege-on-southeast-asias-militaries/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/axios-npm-breach-north-koreas-precision-strike-on-js-devs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hasbros-breach-weeks-of-chaos-ahead/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-are-chunking-data-to-dodge-your-next-gen-firewalls-app-id-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-terminal-lifeline-macos-now-blocks-clickfix-paste-bombs-before-they-explode/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cisos-bet-big-on-ai-security-toolsbut-whos-cashing-in/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/prompt-fuzzing-tears-through-llm-guardrails-evasion-hits-highs-across-open-and-closed-models/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/latin-americas-digital-frontlines-governments-bracing-for-cyber-onslaught/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crowdstrikes-bold-bet-taming-ai-agents-before-they-backfire-on-endpoints/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/glassworms-stealthy-crawl-fake-extensions-and-blockchain-c2-turn-dev-tools-into-spyware-nightmares/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/leaked-us-iphone-hack-tool-turns-your-phone-into-a-spy-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/feds-smash-four-iot-botnets-that-powered-ddos-attacks-big-enough-to-black-out-the-dod/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsofts-march-2026-patch-tuesday-drops-77-fixes-including-ai-spotted-criticals-but-heres-why-it-cant-snooze/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cve-2026-20929-hackers-hijack-your-certs-with-dns-cname-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/us-router-ban-foreign-gear-out-prices-up-security-gamble-in/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cloud-phones-let-crooks-rent-victim-mimics-for-pennies-dodging-bank-defenses/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-vertex-ai-lets-ai-agents-roam-free-palo-altos-wake-up-call/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/pixel-9s-silent-killer-0-click-exploits-via-obscure-audio-codecs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/millions-of-crime-tips-leaked-the-hack-that-shatters-anonymous-reporting/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/five-ways-ui-access-cracked-windows-admin-protection-before-it-even-launched/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/scattered-lapsus-shinyhunters-paying-them-just-buys-more-swats-and-threats/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/iranian-hackers-erase-strykers-digital-lifeline-medtechs-nightmare-begins/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/f5-big-ip-rce-bug-sparks-patch-panic/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-code-boom-overwhelms-appsec-black-duck-ceo-sounds-alarm/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/kimwolf-botnets-accidental-i2p-siege-a-sybil-flood-exposes-anonymitys-fragile-core/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/venom-stealer-the-malware-that-turns-one-time-heists-into-endless-data-streams/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-rare-lifeline-to-old-iphones-dodging-darkswords-web-traps/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/deepload-ais-junk-code-arsenal-redefines-malware-stealth/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/canisterworm-cybercrooks-hijack-iran-tensions-for-cloud-data-heists/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/north-korea-poisons-axios-npm-with-rats-in-bold-supply-chain-hit/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/residential-proxies-ghost-past-ip-defenses-in-78-of-4-billion-attacks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-hackers-swap-wipers-for-identity-strikes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/100-tax-scams-flood-inboxes-in-early-2026-criminals-get-sneakier/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/latams-hidden-cyber-wizards-self-taught-talent-ready-to-crush-the-attack-wave/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-credential-blitz-aws-and-azure-fall-in-hours-not-days/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/employee-data-breaches-hit-uk-seven-year-highblame-the-hybrid-hustle/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-27-day-blackout-fuels-global-phishing-frenzy-and-wiper-warnings/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-late-darksword-patch-hits-more-iphones-too-little-too-late/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hackers-turn-github-into-malwares-secret-batphonesouth-korea-in-the-crosshairs/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/dort-the-minecraft-cheat-kid-running-kimwolfs-mayhem/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-ruthless-hijack-of-security-scanners-500k-machines-300gb-stolen/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/eviltokens-phishings-drag-and-drop-nightmare-for-microsoft-logins/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/apples-darksword-panic-patch-why-your-old-iphone-just-got-a-lifeline/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/airsnitch-wi-fis-encryption-shield-cracked-from-the-inside/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/storm-infostealer-hackers-now-decrypt-your-passwords-on-their-servers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/akira-ransomware-full-attack-in-under-60-minutes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/starkiller-the-proxy-that-turns-real-logins-into-criminal-goldmines/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/whisperpair-exposes-google-fast-pair-headphones-to-eavesdroppers-everywhere/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/teampcps-stolen-secrets-pipeline-fueling-ransomware-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/claude-codes-epic-leak-turns-github-into-a-malware-minefield/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/irans-hackers-dust-off-pay2key-fake-ransomware-real-chaos/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-android-16-drops-a-digital-fortress-for-journalists-and-politicians-under-siege/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/drift-protocols-280m-governance-hijack-exposes-defis-multisig-weak-spot/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/microsofts-february-2026-patch-tuesday-plugs-six-actively-exploited-zero-days/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/project-zeros-blog-glow-up-old-exploits-still-fresh-as-yesterdays-zero-day/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/uk-power-grids-and-factories-on-the-brink-5m-ot-downtime-nightmares-hit-80-of-cni-firms/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/pixel-9s-dolby-decoder-the-0-click-path-project-zero-just-paved-wide-open/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/rsac-2026-exposes-ais-dark-side-in-a-fractured-geopolitical-world/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/windows-11-admin-protection-bypassednine-times-over/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/novoice-malwares-rampage-23-million-android-phones-rooted-via-google-play/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/clorox-sues-vendor-for-coughing-up-passwords-in-380m-hack-fiasco/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/sharefiles-hidden-backdoor-how-two-flaws-chain-into-pre-auth-rce-hell/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/cisco-imcs-password-change-flaw-hands-attackers-the-keys-to-your-servers/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-gmail-breach-panic-25-billion-users-safe-but-phishings-still-raging/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/why-cybersecuritys-ai-is-stuck-learning-yesterdays-threats/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/leaked-cellebrite-matrix-names-pixel-6-9-models-ripe-for-hacking/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/1500-whatsapp-engineers-had-unrestricted-access-to-user-data-whistleblower-alleges/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ta416-strikes-back-chinese-espionage-floods-european-diplomats-inboxes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/chatgpts-one-prompt-data-heist-your-secrets-just-got-leaky/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-and-quantum-are-gutting-digital-trust-time-to-panic/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/27-seconds-to-breach-crowdstrikes-charlotte-ai-hype-check/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/virtualboxs-dusty-2017-heap-hack-guests-storming-the-host-via-slirp-shenanigans/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crowdstrikes-flex-for-services-flexible-fix-or-sticky-upsell/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/ai-toxins-dodge-dna-screeners-microsofts-wake-up-call-on-biological-zero-days/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/getprocesshandlefromhwnd-windows-apis-lies-fuel-uac-bypasses/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/rsac-2026-ai-hype-meets-human-reality-in-cybersecurity/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/darksword-the-iphone-killer-now-lurking-on-legit-websites/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/shattering-macos-defenses-cve-2024-54529-exploit-unleashed/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/trueconf-zero-day-lets-hackers-hijack-meetings-for-malware-drops/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/stryker-recovers-from-iranian-data-wipeout-in-record-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/f5-big-ips-cve-2025-53521-dos-flaw-morphs-into-rce-weapon-already-hitting-the-wild/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crowdstrikes-falcon-data-security-taming-datas-borderless-dash/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/hospitals-are-ransomware-baitmock-drills-could-be-their-lifeline/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crystalrat-malware-that-flips-your-screen-while-stealing-your-data/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/crooks-scout-zillow-for-vacant-houses-to-hijack-your-mail/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/venom-stealer-maas-makes-clickfix-attacks-dirt-cheap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/your-everyday-login-is-now-hackers-front-door-to-chaos/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/14000-f5-big-ip-doors-wide-open-to-rce-nightmares/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/article/googles-developer-verification-plan-buries-androids-open-roots/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.8</priority></url><url><loc>https://threatdigest.io/de/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/diverse-threat-actors-exploiting-critical-winrar-vulnerability-cve-2025-8088/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/anthropics-mythos-will-force-a-cybersecurity-reckoningjust-not-the-one-you-think/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/google-rolls-out-cookie-theft-protections-in-chrome/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/orthanc-dicom-vulnerabilities-lead-to-crashes-rce/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/this-fake-windows-support-website-delivers-password-stealing-malware/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/politicians-are-spending-more-money-on-security-as-they-increasingly-become-targets/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/apple-intelligence-ai-guardrails-bypassed-in-new-attack/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/we-were-not-ready-for-this-lebanons-emergency-system-is-hanging-by-a-thread/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/your-next-breach-will-look-like-business-as-usual/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/eurail-says-december-data-breach-impacts-300000-individuals/</loc><lastmod>2026-04-11</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it-needs/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/the-hack-that-exposed-syrias-sweeping-security-failures/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/trent-ai-emerges-from-stealth-with-13-million-in-funding/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/a-little-bit-pivoting-what-web-shells-are-attackers-looking-forx3f-tue-apr-7th/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc><lastmod>2026-04-07</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/what-to-watch-this-week-ransomware-reloads-vulns-ignite-nation-states-strike-20260405/</loc><lastmod>2026-04-05</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hackers-hijack-eus-cloud-via-poisoned-scanner-300gb-of-citizen-data-gone/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/daily-briefing-april-04-2026/</loc><lastmod>2026-04-04</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/coca-cola-and-ferrari-job-offers-hijacking-your-google-accounts-in-real-time/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/swarm-intelligence-under-siege-how-attackers-crack-amazon-bedrocks-multi-agent-fortress/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/meta-ghosts-mercor-after-breach-spills-ai-training-secrets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/jurassic-fishs-fatal-squid-snack-a-150-million-year-cyber-warning/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/apples-bold-patch-darksword-falls-to-ios-18-backport/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/ta416s-sneaky-return-china-linked-hackers-hit-europe-with-plugx-and-oauth-tricks/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hims-hers-zendesk-slip-up-hackers-snag-millions-of-intimate-support-tickets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/microsoft-unmasks-cookie-driven-php-shells-lurking-in-linux-crons/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/qilin-ransomware-snares-die-linke-german-lefts-data-dangling-over-the-abyss/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/hacker-gangs-clash-over-teampcps-supply-chain-rampage/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/ransomwares-vicious-evolution-from-locks-to-blackmail-and-beyond/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/chainguard-factory-20-auto-hardening-hype-or-real-fix/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/teampcps-trivy-rampage-eu-cloud-breached-1000-saas-targets-quantified/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/venom-phaas-powers-ruthless-credential-grabs-from-c-suite-targets/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/chinese-hackers-turn-trueconfs-secure-updates-into-a-government-trap/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/chatgpts-silent-data-leak-android-rootkits-infect-millions-ransomware-hits-water-plants-the-real-cyber-peril/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/north-korean-hackers-slick-slack-trick-inside-the-axios-npm-compromise/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/vendor-blind-spots-the-third-party-risks-quietly-torpedoing-client-security/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/sharefiles-double-flaw-unauthenticated-rce-via-config-hijack-and-web-shell-drop/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/53-of-firms-run-critically-outdated-mobile-osattack-surface-explodes/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/react2shell-how-a-react-bug-turned-766-servers-into-credential-vaults/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/t-mobiles-isolated-breach-vendor-insider-hits-one-account-but-history-says-watch-out/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/north-koreas-hackers-vaporize-285m-from-drift-in-seconds/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/drifts-285m-nightmare-dprks-nonce-social-engineering-masterclass/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/de/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/pt-br/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/fr/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ko/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ru/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/ja/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/tr/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/es/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/it/article/sparkcats-sneaky-return-app-store-apps-now-hunt-your-crypto-seed-phrases/</loc><lastmod>2026-04-03</lastmod><changefreq>daily</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/data-breaches/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/vulnerabilities/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/ransomware-malware/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/nation-state/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/security-tools/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/compliance-policy/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/cloud-security/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/category/threat-intel/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatdigest.io/about/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/privacy/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/terms/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/tools/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url><url><loc>https://threatdigest.io/advertise/</loc><changefreq>monthly</changefreq><priority>0.4</priority></url>
</urlset>
