<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://threatnoir.com/</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/feed</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-soc</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-leaders</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-learners</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-developers</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/feed.xml</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/articles/feed.xml</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/awareness/feed.xml</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/focus/feed.xml</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/podcast/feed.xml</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/show/feed.xml</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/weekly/feed.xml</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/iocs</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/podcast</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/podcast/archive</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/awareness</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/resources</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/developer</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/review</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/contact</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/legal</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/subscribe</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/auth/signup</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/auth/login</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ai-security</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/breaches</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ccpa-cpra</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/cloud-security</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/compliance</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/cryptography</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/dora</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/dsa-dma</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-ai-act</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-cyber-resilience-act</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-cybersecurity-act</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/gdpr</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/hipaa</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/identity-access</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/incident-response</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/iot-ot</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/malware</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nation-state</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nis2</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nist</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/open-source</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/pci-dss</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/policy</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/privacy</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/privacy-fines</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ransomware</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/sec-cyber</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/supply-chain</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/threat-intelligence</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/tools</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/uk-data-protection</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/vulnerabilities</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/zero-day</loc>
    <lastmod>2026-05-13T21:38:06.848Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w19</loc>
    <lastmod>2026-05-10T05:01:44.372Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w18</loc>
    <lastmod>2026-05-03T07:36:12.240Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w17</loc>
    <lastmod>2026-04-26T07:59:12.542Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w16</loc>
    <lastmod>2026-04-20T04:31:16.828Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w15</loc>
    <lastmod>2026-04-13T00:01:17.779Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w14</loc>
    <lastmod>2026-04-06T00:02:09.939Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w13</loc>
    <lastmod>2026-03-31T19:50:57.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/our-research-reveals-agent-god-mode-in-amazon-bedrock-agentcore-overly-broad-iam-moeh6zgi</loc>
    <lastmod>2026-04-27T16:05:21.499Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/firestarter-backdoor-moeh6xo2</loc>
    <lastmod>2026-04-27T16:05:21.499Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign-moef218f</loc>
    <lastmod>2026-04-27T15:05:21.675Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/cve-2026-34197-13-year-old-apache-activemq-rce-via-jolokia-api-surfaces-for-in-t-mo7if4th</loc>
    <lastmod>2026-04-25T14:09:53.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/52m-download-protobuf-js-library-hit-by-rce-in-schema-handling-mo7if6w9</loc>
    <lastmod>2026-04-25T14:09:53.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/a-threat-actor-operating-under-the-alias-spider321-has-shared-samples-of-an-alle-mo7if8of</loc>
    <lastmod>2026-04-25T14:09:53.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/horner-automation-cscape-and-xl4-xl7-plc-mo4lcljc</loc>
    <lastmod>2026-04-20T18:09:46.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face-mo4lcjwb</loc>
    <lastmod>2026-04-20T18:09:46.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/zionsiphon-malware-designed-to-sabotage-water-treatment-systems-mo4lcn8j</loc>
    <lastmod>2026-04-20T18:09:46.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/wolfssl-vulnerability-hits-iot-routers-and-military-systems-update-to-5-9-1-now-mo1m7mn5</loc>
    <lastmod>2026-04-18T17:08:26.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/10-domain-could-have-handed-hackers-25k-endpoints-including-in-ot-and-gov-networ-mo1m7ov2</loc>
    <lastmod>2026-04-18T17:08:26.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeov-mo1m7keq</loc>
    <lastmod>2026-04-18T17:08:26.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side-mnyrbi1z</loc>
    <lastmod>2026-04-16T15:09:14.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/north-korea-s-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware-mnyrbkd1</loc>
    <lastmod>2026-04-16T15:09:14.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/apt41-delivers-zero-detection-backdoor-to-harvest-cloud-credentials-mnyrbfx2</loc>
    <lastmod>2026-04-16T15:09:14.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/ugly-iranian-apts-confirmed-inside-u-s-water-energy-and-government-infrastructur-mnvwe5ji</loc>
    <lastmod>2026-04-14T15:08:54.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides-mnvwe3qm</loc>
    <lastmod>2026-04-14T15:08:54.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/good-fbi-dismantles-gru-apt28-dns-hijacking-network-23-states-thousands-of-route-mnvwe779</loc>
    <lastmod>2026-04-14T15:08:54.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/inside-the-fbi-s-router-takedown-that-cut-off-apt28-s-tremendous-access-mnszfjr8</loc>
    <lastmod>2026-04-12T15:07:38.215Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/threat-actor-claims-to-be-selling-cisco-source-code-and-database-containing-3-15-mnszfhuj</loc>
    <lastmod>2026-04-12T15:07:38.215Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december-mnszffup</loc>
    <lastmod>2026-04-12T15:07:38.215Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto-mnq4jb72</loc>
    <lastmod>2026-04-10T14:09:20.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/a-well-known-initial-access-broker-is-selling-root-level-remote-code-execution-a-mnq4jkqg</loc>
    <lastmod>2026-04-10T14:09:20.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/russian-forest-blizzard-hackers-hijack-home-routers-for-global-spying-mnq4jdon</loc>
    <lastmod>2026-04-10T14:09:20.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released-mnn9mfvv</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/hackers-exploit-react2shell-in-automated-credential-theft-campaign-mnn9mhj4</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-mnn9me4z</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack-mnkcn24d</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more--mnkcn428</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities-mnkcn0gz</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/government-cybersecurity-showcase-aotearoa-2026</loc>
    <lastmod>2026-05-12T02:01:00.832Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-network-group-fs-information-security-network-uk-2026</loc>
    <lastmod>2026-05-12T02:01:00.081Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-forum-threat-intel-2026</loc>
    <lastmod>2026-05-12T02:00:59.287Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/europe-it-security-conference-2026</loc>
    <lastmod>2026-05-12T02:00:58.273Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/kb4-con-2026</loc>
    <lastmod>2026-05-12T02:00:57.067Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-open-house-series-2</loc>
    <lastmod>2026-05-08T02:01:14.788Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/donversations-live-with-special-guest-mike-mathes-2</loc>
    <lastmod>2026-05-08T02:01:10.858Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/isaca-north-america-conference-2026</loc>
    <lastmod>2026-05-06T02:00:47.845Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/hack-space-con-2026</loc>
    <lastmod>2026-05-06T02:00:47.169Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/dicyfor-ai-security-summit-singapore-2026</loc>
    <lastmod>2026-05-06T02:00:46.650Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/pivotcon-2026</loc>
    <lastmod>2026-05-06T02:00:46.166Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/v2-security-copenhagen-2026</loc>
    <lastmod>2026-05-06T02:00:45.672Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-belo-horizonte-2026</loc>
    <lastmod>2026-05-06T02:00:44.623Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/from-paperwork-to-provenance-navigating-the-fedramp-20x-pivot</loc>
    <lastmod>2026-05-05T02:01:11.784Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-bay-area-2026</loc>
    <lastmod>2026-05-05T02:01:11.351Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopsdays-austin-2026</loc>
    <lastmod>2026-05-05T02:01:10.718Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gisec-global-2026</loc>
    <lastmod>2026-05-05T02:01:10.204Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-road-to-2026-security-travel-and-threat-intelligence-for-the-world-s-biggest</loc>
    <lastmod>2026-05-05T02:01:09.836Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/channelpro-defend-chicago-2026</loc>
    <lastmod>2026-05-05T02:01:09.464Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/rightscon-2026</loc>
    <lastmod>2026-05-05T02:01:08.528Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/black-hat-usa-2026</loc>
    <lastmod>2026-05-05T02:01:07.236Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gartner-security-risk-management-summit-2026</loc>
    <lastmod>2026-05-05T02:01:06.402Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infosecurity-europe-2026</loc>
    <lastmod>2026-05-05T02:01:05.580Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cybersecurity-in-healthcare-conference-2026</loc>
    <lastmod>2026-05-03T02:00:52.742Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/delinea-virtual-customer-day-emea</loc>
    <lastmod>2026-05-03T02:00:52.382Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ibm-think-2026</loc>
    <lastmod>2026-05-02T02:00:56.805Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/extreme-connect-2026</loc>
    <lastmod>2026-05-02T02:00:56.451Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/iapp-canada-symposium-2026</loc>
    <lastmod>2026-05-02T02:00:55.902Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/usenix-symposium-on-networked-systems-design-and-implementation-nsdi-2026</loc>
    <lastmod>2026-05-02T02:00:55.550Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/nlit-summit-2026</loc>
    <lastmod>2026-05-02T02:00:54.688Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/toulouse-hacking-convention-thcon-2026</loc>
    <lastmod>2026-05-01T02:01:02.973Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/servicenow-knowledge-2026</loc>
    <lastmod>2026-05-01T02:01:02.454Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-manila-2026</loc>
    <lastmod>2026-05-01T02:01:01.917Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sans-spring-cyber-solutions-fest-2026</loc>
    <lastmod>2026-05-01T02:01:01.075Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/secure-miami-2026</loc>
    <lastmod>2026-05-01T02:01:00.561Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mysecurityevent-berlin-2026</loc>
    <lastmod>2026-05-01T02:01:00.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/supply-chain-attacks-are-exploding</loc>
    <lastmod>2026-05-01T02:00:59.517Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-attacks-are-coming-are-you-ready</loc>
    <lastmod>2026-05-01T02:00:59.160Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/corinium-ciso-fsi-singapore-2026</loc>
    <lastmod>2026-05-01T02:00:58.800Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/iapp-canada-symposium-2026-privacy-ai-governance-cybersecurity-law</loc>
    <lastmod>2026-05-01T02:00:58.187Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/jax-2026</loc>
    <lastmod>2026-05-01T02:00:57.711Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/riskworld-2026</loc>
    <lastmod>2026-05-01T02:00:56.602Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gitec-2026</loc>
    <lastmod>2026-05-01T02:00:56.226Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mindfluence-ciso-executive-leadership-forum-napa-2026</loc>
    <lastmod>2026-05-01T02:00:55.863Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/safeguard-conference-2026</loc>
    <lastmod>2026-05-01T02:00:55.218Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/national-cryptologic-foundation-s-ncf-cyber-saturday-may-2026</loc>
    <lastmod>2026-05-01T02:00:54.523Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/donversations-live-with-special-guest-mike-mathes</loc>
    <lastmod>2026-04-29T02:01:10.115Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-open-house-series</loc>
    <lastmod>2026-04-29T02:01:09.227Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/konnect-fest-2026</loc>
    <lastmod>2026-04-26T02:01:01.002Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/milipol-techx-summit-2026</loc>
    <lastmod>2026-04-26T02:01:00.247Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cybereco-cybersecurity-conference-2026</loc>
    <lastmod>2026-04-26T02:00:59.902Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdstrike-adversary-week-europe-s-threat-landscape-insights-from-the-front-lin</loc>
    <lastmod>2026-04-26T02:00:59.556Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-new-frontlines-of-code-security-defending-agentic-workflows</loc>
    <lastmod>2026-04-26T02:00:59.172Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-singapore-2026</loc>
    <lastmod>2026-04-26T02:00:58.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberx-indonesia-2026</loc>
    <lastmod>2026-04-26T02:00:58.479Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/inside-the-ai-gateway-secure-smart-and-scalable-ai-traffic-management</loc>
    <lastmod>2026-04-26T02:00:58.117Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mission-critical-ot-can-t-depend-on-the-cloud</loc>
    <lastmod>2026-04-26T02:00:57.648Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ciso-inspired-summit-uk-april-north-2026</loc>
    <lastmod>2026-04-26T02:00:57.282Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/pulse-conferences-ciso-360-uk-2026</loc>
    <lastmod>2026-04-26T02:00:56.922Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-ready-data-security-discover-classify-and-govern-data-for-safe-ai-adoption</loc>
    <lastmod>2026-04-26T02:00:56.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/proofpoint-protect-insights-santiago-2026</loc>
    <lastmod>2026-04-26T02:00:55.814Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/manageengine-userconf-turkey-2026</loc>
    <lastmod>2026-04-26T02:00:55.159Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/heimdal-labs-deep-dive-april</loc>
    <lastmod>2026-04-26T02:00:54.257Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/stareast-2026</loc>
    <lastmod>2026-04-26T02:00:53.406Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/national-cyber-crime-conference-2026</loc>
    <lastmod>2026-04-25T02:01:02.575Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/a1-digital-cybersecurity-summit-2026</loc>
    <lastmod>2026-04-25T02:01:02.182Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/def-con-singapore-2026</loc>
    <lastmod>2026-04-25T02:01:01.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cybersecurity-and-privacy-professionals-conference-2026</loc>
    <lastmod>2026-04-25T02:01:01.239Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopsdays-copenhagen-2026</loc>
    <lastmod>2026-04-25T02:01:00.863Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/identity-summit-by-socure-2026</loc>
    <lastmod>2026-04-25T02:01:00.135Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-revolution-summit-malaysia-2026</loc>
    <lastmod>2026-04-25T02:00:59.758Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-kansas-city-2026</loc>
    <lastmod>2026-04-25T02:00:59.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-cryptography-security-and-privacy-csp-2026</loc>
    <lastmod>2026-04-25T02:00:58.484Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/2026-hacktheon-sejong-international-collegiate-cybersecurity-competition</loc>
    <lastmod>2026-04-25T02:00:57.845Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/virtual-foundational-application-of-social-engineering</loc>
    <lastmod>2026-04-25T02:00:57.146Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-charm-2026</loc>
    <lastmod>2026-04-25T02:00:56.411Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-national-capital-region-security-forum-may-2026-networking</loc>
    <lastmod>2026-04-24T02:01:11.151Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/siathere-nashville</loc>
    <lastmod>2026-04-23T02:00:41.875Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sinetsilicon-valley-2026</loc>
    <lastmod>2026-04-20T02:01:00.697Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ertl-yang-leader-summit-2026-basel</loc>
    <lastmod>2026-04-20T02:01:00.140Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-warsaw-2026</loc>
    <lastmod>2026-04-20T02:00:59.686Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/passwords-aren-t-dead-yet-the-hybrid-strategy-for-a-passwordless-future</loc>
    <lastmod>2026-04-20T02:00:58.103Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/psa-tec-2026</loc>
    <lastmod>2026-04-20T02:00:57.236Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopscon-amsterdam-2026</loc>
    <lastmod>2026-04-20T02:00:56.038Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-challenges-of-3rd-party-software-risk-from-contributions-to-consumption</loc>
    <lastmod>2026-04-19T02:01:11.389Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/stop-trusting-packages-start-verifying-them-inside-the-spectra-assure-community</loc>
    <lastmod>2026-04-19T02:01:10.852Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-preventable-breach-what-a-retired-fbi-agent-learned-from-1-000-victims</loc>
    <lastmod>2026-04-19T02:01:10.325Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/quartz-network-cio-ciso-summit-2026</loc>
    <lastmod>2026-04-19T02:01:09.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/western-canada-information-security-conference-wcisc-2026</loc>
    <lastmod>2026-04-19T02:01:09.313Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/aus-gov-data-summit-2026</loc>
    <lastmod>2026-04-19T02:01:08.790Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/hmg-strategy-annual-washington-d-c-c-level-technology-leadership-summit-2026</loc>
    <lastmod>2026-04-19T02:01:08.239Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-leaders-summit-london-april-2026</loc>
    <lastmod>2026-04-19T02:01:07.686Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberuk-2026</loc>
    <lastmod>2026-04-19T02:01:07.097Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/black-hat-asia-2026</loc>
    <lastmod>2026-04-19T02:01:06.576Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/level-zero-conference-2026</loc>
    <lastmod>2026-04-19T02:01:05.978Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sans-ai-summit-solutions-track-2026</loc>
    <lastmod>2026-04-19T02:01:05.235Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/innovate-marco-island-2026</loc>
    <lastmod>2026-04-19T02:01:04.812Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/lynx-ai-security-summit-2026</loc>
    <lastmod>2026-04-19T02:01:04.115Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/expo-seguridad-m-xico-2026</loc>
    <lastmod>2026-04-17T02:01:27.018Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/design-automation-and-test-in-europe-conference-date-2026</loc>
    <lastmod>2026-04-17T02:01:14.394Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/data-center-world-2026</loc>
    <lastmod>2026-04-17T02:01:13.965Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mlcon-amsterdam-2026</loc>
    <lastmod>2026-04-17T02:01:13.558Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/privacy-symposium-2026</loc>
    <lastmod>2026-04-17T02:01:13.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/global-security-symposium-ksa-2026</loc>
    <lastmod>2026-04-17T02:01:11.715Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sparkcon-2026</loc>
    <lastmod>2026-04-17T02:01:10.138Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ctf-cit-networking-event-2026</loc>
    <lastmod>2026-04-17T02:01:09.698Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/holiday-in-scambodia-hacknwa-2026</loc>
    <lastmod>2026-04-17T02:01:09.264Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sreday-san-francisco-2026</loc>
    <lastmod>2026-04-17T02:01:08.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/beyond-cyber-compliance-turning-regulatory-gaps-into-strategic-advantages</loc>
    <lastmod>2026-04-17T02:01:08.343Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/building-a-disaster-recovery-strategy-resilience-wherever-work-lives</loc>
    <lastmod>2026-04-17T02:01:07.674Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-bangalore-2026</loc>
    <lastmod>2026-04-17T02:01:07.177Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/patch-tuesday-community-session</loc>
    <lastmod>2026-04-17T02:01:06.489Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/what-s-behind-fraud-rates-spiking-inside-the-sentilink-fraud-report</loc>
    <lastmod>2026-04-17T02:01:05.716Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-red-and-blue-teaming-summit-2026</loc>
    <lastmod>2026-04-17T02:01:05.129Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-govsummit-2026</loc>
    <lastmod>2026-04-15T02:01:18.073Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/vertical-insights-k-12-school-security-symposium</loc>
    <lastmod>2026-04-14T02:01:17.701Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/oracle-ai-world-tour-2026-singapore</loc>
    <lastmod>2026-04-13T02:01:08.252Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/fraud-fight-club-2026</loc>
    <lastmod>2026-04-13T02:01:07.725Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ians-ciso-roundtable-boston-2026</loc>
    <lastmod>2026-04-13T02:01:07.190Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/akamai-tech-day-nieuwegein-2026</loc>
    <lastmod>2026-04-13T02:01:06.701Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/shorter-tls-series-your-guide-to-c-level-buy-in</loc>
    <lastmod>2026-04-13T02:01:06.170Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/securing-your-spot-in-the-canadian-defence-supply-chain-how-to-turn-cpcsc-requir</loc>
    <lastmod>2026-04-13T02:01:05.094Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/opentext-summit-munich-2026</loc>
    <lastmod>2026-04-13T02:01:04.054Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/generative-ai-summit-2026</loc>
    <lastmod>2026-04-13T02:01:03.330Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/aiweek-2026</loc>
    <lastmod>2026-04-13T02:01:01.865Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-state-of-industrial-remote-access</loc>
    <lastmod>2026-04-12T02:01:07.303Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/introducing-the-adaptive-era-of-email-security</loc>
    <lastmod>2026-04-12T02:01:06.877Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-ambient-systems-networks-and-technologies-ant-2026</loc>
    <lastmod>2026-04-12T02:01:06.357Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/chief-information-security-officer-summit-silicon-valley</loc>
    <lastmod>2026-04-12T02:01:05.805Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/channelnext-east-2026</loc>
    <lastmod>2026-04-12T02:01:05.430Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gds-security-insight-summit-2026</loc>
    <lastmod>2026-04-12T02:01:04.951Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/consortium-for-school-networking-cosn-2026</loc>
    <lastmod>2026-04-12T02:01:03.564Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-c2-2026</loc>
    <lastmod>2026-04-12T02:01:03.022Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/rh-isac-cybersecurity-summit-2026</loc>
    <lastmod>2026-04-12T02:01:02.408Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-current-state-of-ai-in-threat-intelligence</loc>
    <lastmod>2026-04-11T02:01:05.486Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/statewide-it-conference-2026</loc>
    <lastmod>2026-04-11T02:01:03.510Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-applied-computing-cac-2026</loc>
    <lastmod>2026-04-11T02:01:03.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/siathere-guadalajara</loc>
    <lastmod>2026-04-10T02:01:15.404Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cellebrite-c2c-user-summit-2026</loc>
    <lastmod>2026-04-10T02:01:04.586Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/fs-isac-fincyber-today-canada-2026</loc>
    <lastmod>2026-04-10T02:01:04.061Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cve-first-vulncon-annual-cna-summit-2026</loc>
    <lastmod>2026-04-10T02:01:02.699Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/so-con-2026</loc>
    <lastmod>2026-04-10T02:01:02.116Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-software-engineering-icse-2026</loc>
    <lastmod>2026-04-10T02:01:01.582Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/owasp-boston-application-security-conference-basc</loc>
    <lastmod>2026-04-10T02:01:00.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/boston-application-security-conference-basc-2026</loc>
    <lastmod>2026-04-10T02:01:00.203Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-oklahoma-2026</loc>
    <lastmod>2026-04-10T02:00:59.677Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-mumbai-2026</loc>
    <lastmod>2026-04-10T02:00:58.869Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/security-leader-summit-5-2026</loc>
    <lastmod>2026-04-10T02:00:58.171Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/beyond-backup-the-rapid-recovery-data-readiness-series-building-a-disaster-recov</loc>
    <lastmod>2026-04-10T02:00:57.638Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mdc-cybersecurity-hackathon-and-industry-panel</loc>
    <lastmod>2026-04-10T02:00:57.001Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/interference-ahead-why-the-security-industry-is-fighting-a-monopolistic-wireless</loc>
    <lastmod>2026-04-09T02:01:23.730Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/spm-seminar-at-psa-tec-2026</loc>
    <lastmod>2026-04-09T02:01:22.491Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-national-capital-region-security-forum-april-2026-networking</loc>
    <lastmod>2026-04-09T02:01:22.195Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/donversations-live-with-special-guest-scott-elkins</loc>
    <lastmod>2026-04-09T02:01:21.142Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ertl-yang-leader-summit-2026-singapore</loc>
    <lastmod>2026-04-09T02:01:10.998Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ransomware-in-the-ai-era-what-s-real-what-s-not</loc>
    <lastmod>2026-04-09T02:01:10.516Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/learn-how-to-automate-compliance-for-soc-2-iso-27001-and-more</loc>
    <lastmod>2026-04-09T02:01:10.033Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/securing-modern-ai-applications-with-wiz-ai-app-from-code-to-runtime</loc>
    <lastmod>2026-04-09T02:01:09.572Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-onchain-fraud-prevention-blueprint-why-investigation-first-is-failing-digita</loc>
    <lastmod>2026-04-09T02:01:09.111Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/oracle-ai-world-tour-2026-new-york-city</loc>
    <lastmod>2026-04-09T02:01:08.611Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopsdays-buenos-aires-2026</loc>
    <lastmod>2026-04-09T02:01:08.025Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/achieving-misra-c-2023-compliance-with-sonar</loc>
    <lastmod>2026-04-09T02:01:07.531Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/2026-rsac-conference-recap</loc>
    <lastmod>2026-04-09T02:01:06.985Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-salt-lake-city-2026</loc>
    <lastmod>2026-04-09T02:01:06.465Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/atlseccon-2026</loc>
    <lastmod>2026-04-09T02:01:05.795Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/kernelcon-2026</loc>
    <lastmod>2026-04-09T02:01:05.255Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/app-state-cyber-summit-2026</loc>
    <lastmod>2026-04-09T02:01:04.679Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/futurecon-cybersecurity-conference-minneapolis-2026</loc>
    <lastmod>2026-04-09T02:01:04.032Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/operationalize-threat-intelligence-3-essential-integration-workflows</loc>
    <lastmod>2026-04-09T02:01:03.368Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/beyond-the-perimeter-how-to-see-every-threat-in-hybrid-networks</loc>
    <lastmod>2026-04-09T02:01:02.658Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/hipaa-in-2026-balancing-compliance-and-security-with-lean-teams</loc>
    <lastmod>2026-04-09T02:01:01.854Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cspm-review-course-may-2026</loc>
    <lastmod>2026-04-04T02:01:18.324Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/humanx-san-francisco-2026</loc>
    <lastmod>2026-04-02T11:40:07.626Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/entelec-conference-expo-2026</loc>
    <lastmod>2026-04-02T11:40:07.045Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-san-diego-2026</loc>
    <lastmod>2026-04-02T11:40:06.441Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-milwaukee-2026</loc>
    <lastmod>2026-04-02T11:40:05.799Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyera-product-spotlight-dspm-datawatcher-in-action-from-data-chaos-to-data-zen-2</loc>
    <lastmod>2026-04-02T11:40:05.253Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/vertical-insights-stadium-security-symposium</loc>
    <lastmod>2026-04-02T10:32:25.168Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/siathere-new-york-new-jersey</loc>
    <lastmod>2026-04-02T10:32:24.657Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/how-to-gain-it-ot-visibility-and-protect-uptime-with-owl-talon-data-diodes</loc>
    <lastmod>2026-04-02T10:32:13.643Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/everyone-is-deploying-ai-agents-almost-nobody-knows-what-they-re-doing</loc>
    <lastmod>2026-04-02T10:32:12.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-mussoorie-2026</loc>
    <lastmod>2026-04-02T10:32:12.056Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyera-product-spotlight-dspm-datawatcher-in-action-from-data-chaos-to-data-zen</loc>
    <lastmod>2026-04-02T10:32:11.442Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/driving-real-world-resilience-with-technical-exercising-on-immersive-one</loc>
    <lastmod>2026-04-02T10:32:11.054Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/tales-from-the-trenches</loc>
    <lastmod>2026-04-02T10:32:10.691Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ciomeet-chicago-2026</loc>
    <lastmod>2026-04-02T10:32:10.319Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/middle-east-escalation-strengthening-ot-resilience-in-a-rapidly-evolving-threat-</loc>
    <lastmod>2026-04-02T10:32:09.932Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/notiones-final-conference-2026</loc>
    <lastmod>2026-04-02T10:32:09.566Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/introducing-q-firm-android-firmware-security-testing-before-devices-ship</loc>
    <lastmod>2026-04-02T10:32:09.062Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/tracing-a-multi-vector-malware-campaign-from-vbs-to-open-infrastructure</loc>
    <lastmod>2026-04-02T10:32:08.630Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/spies-lies-and-cybercrime-building-a-scalable-cyber-resilience-strategy</loc>
    <lastmod>2026-04-02T10:32:08.225Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infostealers-your-digital-drug-dealers</loc>
    <lastmod>2026-04-02T10:32:07.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/architecting-identity-guardrails-for-agentic-ai</loc>
    <lastmod>2026-04-02T10:32:07.294Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/owasp-italy-day-2026</loc>
    <lastmod>2026-04-02T10:31:32.629Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/it-security-summit-berlin</loc>
    <lastmod>2026-04-02T10:31:31.963Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/european-open-source-security-forum</loc>
    <lastmod>2026-04-02T10:31:31.503Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/include-conf-2026</loc>
    <lastmod>2026-04-02T10:31:31.072Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/elbsides-2026</loc>
    <lastmod>2026-04-02T10:31:30.463Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infosecurity-europe</loc>
    <lastmod>2026-04-02T10:31:29.708Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/security-fest</loc>
    <lastmod>2026-04-02T10:31:28.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/update-conference-krakow-2026</loc>
    <lastmod>2026-04-02T10:31:27.988Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/it-grc-kongress-2026</loc>
    <lastmod>2026-04-02T10:31:27.465Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/confidence-2026</loc>
    <lastmod>2026-04-02T10:31:26.934Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cysat-europe</loc>
    <lastmod>2026-04-02T10:31:25.849Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberwisecon-europe-2026</loc>
    <lastmod>2026-04-02T10:31:25.057Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-security-summit-london</loc>
    <lastmod>2026-04-02T10:31:23.321Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-groningen-2026</loc>
    <lastmod>2026-04-02T10:31:22.470Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/manageengine-roadshow-2026</loc>
    <lastmod>2026-04-02T10:31:21.720Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-threat-intelligence-conference-2026</loc>
    <lastmod>2026-04-02T10:31:20.934Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/secure-2026</loc>
    <lastmod>2026-04-02T10:31:19.583Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/notiones-final-conference</loc>
    <lastmod>2026-04-02T10:31:18.488Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/95fa2e67-7bcd-4c70-b063-80d78dc74624</loc>
    <lastmod>2026-04-04T15:35:46.190Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/a93a00d5-6ca2-4219-86a8-4056d5ca8cf7</loc>
    <lastmod>2026-04-04T15:35:33.077Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/1934800e-de70-4ee9-a027-4d5c5858fee3</loc>
    <lastmod>2026-03-25T19:33:45.057Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/nitrogen-ransomware-hits-foxconn-claims-8tb-stolen</loc>
    <lastmod>2026-05-13T04:00:31.483Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/checkmarx-jenkins-plugin-backdoored-with-infostealer</loc>
    <lastmod>2026-05-12T04:00:23.418Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/attackers-tricked-digicert-into-signing-malware</loc>
    <lastmod>2026-05-11T04:00:25.781Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/jdownloader-site-hacked-installers-replaced-with-rat</loc>
    <lastmod>2026-05-10T04:00:25.952Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/credit-union-breach-exposes-one-million-card-numbers</loc>
    <lastmod>2026-05-09T04:00:30.858Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/shinyhunters-deface-canvas-lms-millions-exposed</loc>
    <lastmod>2026-05-08T04:00:25.458Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/pan-os-zero-day-hands-attackers-root-on-firewalls</loc>
    <lastmod>2026-05-07T04:00:30.144Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/copy-fail-gives-root-without-touching-disk</loc>
    <lastmod>2026-05-06T04:00:30.770Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/weaver-e-cology-rce-exploited-days-after-patch</loc>
    <lastmod>2026-05-05T04:00:31.989Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/shinyhunters-breaches-instructure-exposes-millions-of-students</loc>
    <lastmod>2026-05-04T06:00:23.602Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/vishing-and-sso-abuse-fuel-saas-extortion</loc>
    <lastmod>2026-05-03T10:00:22.375Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/cpanel-auth-bypass-hits-1-5-million-servers</loc>
    <lastmod>2026-05-01T08:00:27.858Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/sap-npm-packages-hijacked-to-steal-secrets</loc>
    <lastmod>2026-04-30T06:00:25.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/bluenoroff-weaponizes-deepfake-zoom-calls-against-crypto-execs</loc>
    <lastmod>2026-04-29T20:00:26.988Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/popular-pypi-package-hijacked-via-github-actions</loc>
    <lastmod>2026-04-28T06:01:14.831Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/entra-agent-id-flaw-hands-over-entire-tenants</loc>
    <lastmod>2026-04-27T06:00:18.650Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/snow-malware-blows-in-through-teams-chat</loc>
    <lastmod>2026-04-26T08:00:27.356Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/wormable-npm-malware-crawls-the-supply-chain</loc>
    <lastmod>2026-04-25T06:00:23.458Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/vercel-breach-spreads-beyond-initial-blast-radius</loc>
    <lastmod>2026-04-24T07:27:38.666Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/dead-routers-walk-mirai-feasts-on-d-link</loc>
    <lastmod>2026-04-24T07:33:04.861Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/french-id-agency-breach-exposes-19-million-citizens</loc>
    <lastmod>2026-04-24T07:33:06.929Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/lazarus-drains-290m-from-kelpdao</loc>
    <lastmod>2026-04-24T07:33:09.049Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/vercel-breached-shinyhunters-selling-stolen-secrets</loc>
    <lastmod>2026-04-24T07:33:59.768Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/protobuf-js-flaw-turns-schemas-into-weapons</loc>
    <lastmod>2026-04-24T07:27:49.115Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/four-android-malware-families-raid-800-banking-apps</loc>
    <lastmod>2026-04-24T07:33:13.120Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/copilot-bug-ignored-sensitivity-labels-for-weeks</loc>
    <lastmod>2026-04-24T07:34:01.691Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/nginx-ui-auth-bypass-under-active-exploitation</loc>
    <lastmod>2026-04-24T07:33:16.848Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/signed-sealed-infected-cpu-z-supply-chain-hit</loc>
    <lastmod>2026-04-24T07:17:47.581Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/wolfssl-flaw-lets-attackers-forge-certificates-on-billions-of-devices</loc>
    <lastmod>2026-04-24T07:28:01.356Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/foxconn-confirms-north-american-factories-hit-by-cyberattack-7e97d7</loc>
    <lastmod>2026-05-13T18:08:56.321Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-palo-alto-networks-find-many-vulnerabilities-by-using-ai-on-their-own--dd1873</loc>
    <lastmod>2026-05-13T18:09:28.717Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released-0e4efb</loc>
    <lastmod>2026-05-13T20:09:30.705Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/foxconn-has-fallen-victim-to-nitrogen-ransomware-data-8tb-over-11-million-files--25cf45</loc>
    <lastmod>2026-05-13T18:07:29.021Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ntn-bearing-corporation-of-america-allegedly-hit-by-payoutsking-ransomware-596-g-6207d6</loc>
    <lastmod>2026-05-13T18:08:11.087Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/akitatek-allegedly-breached-exposing-5-400-customer-records-from-the-french-it-s-5de279</loc>
    <lastmod>2026-05-13T17:07:31.507Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/packagist-urges-immediate-composer-update-after-github-actions-token-leak-e1f413</loc>
    <lastmod>2026-05-13T16:09:48.083Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ci-fortify-cisa-8cb51f</loc>
    <lastmod>2026-05-13T14:09:26.507Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/slovakian-admin-of-dark-web-kingdom-market-jailed-for-16-years-in-us-3f8e60</loc>
    <lastmod>2026-05-13T14:09:17.624Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/716-000-impacted-by-openloop-health-data-breach-a0597f</loc>
    <lastmod>2026-05-13T12:07:01.427Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-critical-zero-click-outlook-vulnerability-threatening-enterpri-41bfbc</loc>
    <lastmod>2026-05-13T12:09:41.804Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chipmaker-patch-tuesday-intel-and-amd-patch-70-vulnerabilities-f9ddf3</loc>
    <lastmod>2026-05-13T10:06:30.722Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-ivanti-patch-critical-vulnerabilities-53fdc9</loc>
    <lastmod>2026-05-13T16:05:31.867Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bvwg-w171-2303402-1-7e-be9784</loc>
    <lastmod>2026-05-13T10:05:34.673Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hundreds-of-malicious-packages-force-rubygems-to-suspend-registrations-d09262</loc>
    <lastmod>2026-05-13T08:05:25.041Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ics-patch-tuesday-new-security-advisories-from-siemens-schneider-cisa-3f1cb4</loc>
    <lastmod>2026-05-13T08:05:42.189Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/foxconn-ransomware-attack-shows-nothing-is-safe-forever-9050a8</loc>
    <lastmod>2026-05-13T02:09:42.493Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canvas-hackers-shinyhunters-say-their-official-domain-was-suspended-9909f3</loc>
    <lastmod>2026-05-12T22:09:43.106Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yippie-two-new-microsoft-windows-0days-the-exploits-have-cool-and-badass-mysteri-cf15a5</loc>
    <lastmod>2026-05-12T22:09:21.783Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uk-fines-water-supplier-1-3m-for-exposing-data-of-664k-customers-849dd8</loc>
    <lastmod>2026-05-12T22:07:34.185Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/signal-adds-security-warnings-for-social-engineering-phishing-attacks-899bdc</loc>
    <lastmod>2026-05-12T20:06:10.399Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-releases-windows-10-kb5087544-extended-security-update-959845</loc>
    <lastmod>2026-05-12T20:06:25.491Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-warns-of-critical-rce-flaws-in-fortisandbox-and-fortiauthenticator-b3d857</loc>
    <lastmod>2026-05-12T20:06:48.275Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-days-40079e</loc>
    <lastmod>2026-05-13T00:06:06.787Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-137-vulnerabilities-b1a8bb</loc>
    <lastmod>2026-05-12T20:05:41.849Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-more-public-disclosures-it-will-never-stop-83f43d</loc>
    <lastmod>2026-05-12T19:09:39.303Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pwn2own-berlin-2026-hits-capacity-as-rejected-hackers-release-0-days-09b58a</loc>
    <lastmod>2026-05-12T19:09:05.420Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/worm-redux-fresh-mini-shai-hulud-infections-bite-supply-chain-c1107c</loc>
    <lastmod>2026-05-12T18:09:48.936Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-and-amnesty-international-teamed-up-to-make-it-harder-for-spyware-vendors-e5caca</loc>
    <lastmod>2026-05-12T18:08:01.905Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/adobe-patches-52-vulnerabilities-in-10-products-727412</loc>
    <lastmod>2026-05-12T18:06:32.500Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hugging-face-packages-weaponized-with-a-single-file-tweak-9298b3</loc>
    <lastmod>2026-05-12T16:05:42.473Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bwh-hotels-says-hackers-had-access-to-reservation-data-for-6-months-667666</loc>
    <lastmod>2026-05-12T16:05:29.408Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-responder-forces-a-netbios-election-and-wins-https-t-co-wihk8u3okm-8654c6</loc>
    <lastmod>2026-05-12T15:05:45.094Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/free-onlyfans-lure-used-to-spread-cross-platform-crpx0-malware-01328c</loc>
    <lastmod>2026-05-12T14:09:39.118Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/deal-reached-with-hackers-to-delete-data-stolen-from-the-canvas-educational-plat-6b5502</loc>
    <lastmod>2026-05-12T14:09:47.703Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/west-pharmaceutical-services-hit-by-disruptive-ransomware-attack-cb5f9b</loc>
    <lastmod>2026-05-12T14:10:04.482Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-patches-dozens-of-vulnerabilities-in-macos-ios-e44139</loc>
    <lastmod>2026-05-12T16:09:49.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-patches-critical-s-4hana-commerce-vulnerabilities-f95029</loc>
    <lastmod>2026-05-12T17:10:06.152Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shai-hulud-attack-ships-signed-malicious-tanstack-mistral-npm-packages-a6001f</loc>
    <lastmod>2026-05-12T12:09:58.937Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-fixes-critical-vulnerabilities-in-commerce-cloud-and-s-4hana-086a27</loc>
    <lastmod>2026-05-12T13:09:06.748Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tanstack-mistral-ai-uipath-hit-in-fresh-supply-chain-attack-a9c42e</loc>
    <lastmod>2026-05-12T16:09:07.897Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/operation-humanitarianbait-uses-fake-aid-documents-to-deploy-python-spyware-b21426</loc>
    <lastmod>2026-05-12T12:08:56.480Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-reaches-agreement-with-shinyhunters-to-stop-data-leak-ca69ec</loc>
    <lastmod>2026-05-12T10:07:31.074Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/state-of-ransomware-in-2026-75f428</loc>
    <lastmod>2026-05-12T08:07:00.735Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ghostlock-tool-abuses-windows-api-to-block-file-access-017c77</loc>
    <lastmod>2026-05-12T03:09:47.278Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gm-agrees-to-12-75m-california-settlement-over-sale-of-drivers-data-350f52</loc>
    <lastmod>2026-05-12T01:09:53.052Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/official-checkmarx-jenkins-package-compromised-with-infostealer-b54543</loc>
    <lastmod>2026-05-12T02:10:02.887Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-may-11th-2026-f920ea</loc>
    <lastmod>2026-05-12T00:09:41.298Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/la-suite-numerique-allegedly-breached-exposing-over-18-million-records-from-the--5446d5</loc>
    <lastmod>2026-05-11T23:09:45.017Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/emergia-contact-center-allegedly-breached-exposing-12-tb-of-data-from-the-colomb-c76c2a</loc>
    <lastmod>2026-05-11T19:09:44.860Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros-818e1c</loc>
    <lastmod>2026-05-11T18:09:28.205Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-confirms-hackers-used-canvas-flaw-to-deface-portals-265210</loc>
    <lastmod>2026-05-11T16:10:03.540Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/build-application-firewalls-aim-to-stop-the-next-supply-chain-attack-f9fee7</loc>
    <lastmod>2026-05-11T21:09:08.340Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/possible-shinyhunters-clearnet-domain-seizure-as-of-about-7-hours-ago-detected-b-0d1bd0</loc>
    <lastmod>2026-05-11T16:09:26.370Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyber-espionage-group-targets-aviation-firms-to-steal-map-data-833eb0</loc>
    <lastmod>2026-05-11T15:09:26.657Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-spotted-an-ai-developed-zero-day-before-attackers-could-use-it-b550a6</loc>
    <lastmod>2026-05-11T15:09:12.902Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-changing-passwords-doesn-t-end-an-active-directory-breach-ecea65</loc>
    <lastmod>2026-05-11T14:07:25.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool-a403f0</loc>
    <lastmod>2026-05-11T15:06:37.050Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-detects-first-ai-generated-zero-day-exploit-e7aa31</loc>
    <lastmod>2026-05-11T14:07:15.621Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/9-year-old-dirty-frag-vulnerability-enables-root-access-on-linux-systems-05fe8f</loc>
    <lastmod>2026-05-11T14:06:42.791Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-vercel-genai-to-mass-produce-convincing-phishing-sites-9e0dac</loc>
    <lastmod>2026-05-11T12:06:06.540Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms-fc9693</loc>
    <lastmod>2026-05-11T10:05:35.733Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/resurrected-crimenetwork-marketplace-taken-down-administrator-arrested-10426f</loc>
    <lastmod>2026-05-11T09:09:58.530Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-500-organizations-hit-in-years-long-phishing-campaign-6a0646</loc>
    <lastmod>2026-05-11T04:09:34.744Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lapsus-group-has-leaked-the-data-of-vodafone-https-t-co-leyjosctp6-cbb713</loc>
    <lastmod>2026-05-10T21:08:03.079Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-us-men-jailed-for-helping-north-korean-hackers-infiltrate-us-firms-816c64</loc>
    <lastmod>2026-05-10T20:08:14.999Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/badc-allegedly-breached-exposing-full-private-git-repo-from-bangladesh-agricultu-2b94b2</loc>
    <lastmod>2026-05-10T20:08:03.670Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-trick-digicert-into-issuing-certificates-used-to-sign-malware-c87b0b</loc>
    <lastmod>2026-05-10T18:05:41.598Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware-b81fa3</loc>
    <lastmod>2026-05-09T20:05:49.161Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/saludsa-allegedly-breached-exposing-35k-medical-records-and-employee-access-from-b30dbe</loc>
    <lastmod>2026-05-09T18:09:02.308Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-openai-repository-on-hugging-face-pushes-infostealer-malware-084216</loc>
    <lastmod>2026-05-09T16:06:04.549Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackable-robot-lawn-mower-unlocks-a-new-nightmare-cca7a0</loc>
    <lastmod>2026-05-09T12:05:52.073Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/houghton-mifflin-harcourt-company-has-been-added-to-the-shinyhunters-pay-or-leak-5ef390</loc>
    <lastmod>2026-05-09T03:05:40.801Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-claims-second-attack-against-instructure-3b3bd4</loc>
    <lastmod>2026-05-08T22:05:39.391Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/preferred-hotels-amp-resorts-allegedly-breached-exposing-450-000-high-net-worth--47f6fd</loc>
    <lastmod>2026-05-08T19:09:30.776Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/security-incident-update-faqs-5fe463</loc>
    <lastmod>2026-05-08T18:09:32.442Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/meetic-allegedly-leaked-exposing-7-million-user-records-from-the-french-online-d-904e1c</loc>
    <lastmod>2026-05-08T17:10:07.033Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/meetic-allegedly-leaked-exposing-7-million-user-records-from-the-french-online-d-33fd1f</loc>
    <lastmod>2026-05-08T17:09:59.256Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ldlc-allegedly-leaked-exposing-1-5-million-customer-records-from-the-french-tech-02dbdb</loc>
    <lastmod>2026-05-08T17:09:26.909Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/community-choice-credit-union-allegedly-breached-exposing-1m-premium-credit-clie-698897</loc>
    <lastmod>2026-05-08T16:09:57.425Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/credilink-allegedly-breached-exposing-243-million-records-from-the-brazilian-cre-c14e9a</loc>
    <lastmod>2026-05-08T16:09:49.801Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/credilink-allegedly-breached-exposing-243-million-records-from-the-brazilian-cre-f277c1</loc>
    <lastmod>2026-05-08T16:09:13.348Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ldlc-allegedly-leaked-exposing-1-5-million-customer-records-from-the-french-tech-d2441f</loc>
    <lastmod>2026-05-08T16:09:19.610Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-uncovered-a-new-brazilian-banking-trojan-campaign-tclbanker-what-makes-tclban-48df2b</loc>
    <lastmod>2026-05-08T14:10:06.339Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-source-code-breach-claimed-by-ransomhouse-hackers-88cf53</loc>
    <lastmod>2026-05-08T14:06:47.076Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day-c3640f</loc>
    <lastmod>2026-05-08T14:07:00.867Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-claims-nearly-9-000-schools-affected-by-canvas-data-breach-602238</loc>
    <lastmod>2026-05-08T14:06:23.839Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/flaw-in-claude-s-chrome-extension-allowed-any-other-plugin-to-hijack-victims-ai-72fb6b</loc>
    <lastmod>2026-05-08T14:06:38.582Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claudebleed-vulnerability-lets-hackers-hijack-claude-chrome-extension-to-steal-d-2767ad</loc>
    <lastmod>2026-05-08T14:06:08.638Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants-3e9e83</loc>
    <lastmod>2026-05-08T12:05:59.754Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach-08af90</loc>
    <lastmod>2026-05-08T12:06:07.684Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyberattack-hits-canvas-system-used-by-thousands-of-schools-as-finals-loom-6bf774</loc>
    <lastmod>2026-05-08T12:06:17.688Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zara-data-breach-exposed-personal-information-of-197-000-people-b2cdd6</loc>
    <lastmod>2026-05-08T12:05:25.154Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pcpjack-worm-removes-teampcp-infections-steals-credentials-0c830d</loc>
    <lastmod>2026-05-10T21:05:18.553Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/former-govt-contractor-convicted-for-wiping-dozens-of-federal-databases-4328b9</loc>
    <lastmod>2026-05-08T10:10:01.745Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp-191ad6</loc>
    <lastmod>2026-05-08T10:09:53.181Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-got-access-to-canvas-infrastructure-from-vishing-social-engineering-c48873</loc>
    <lastmod>2026-05-08T09:09:37.210Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomware-group-takes-credit-for-trellix-hack-c31c55</loc>
    <lastmod>2026-05-08T08:09:55.080Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerability-in-claude-extension-for-chrome-exposes-ai-agent-to-takeover-78ba37</loc>
    <lastmod>2026-05-08T08:10:03.364Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros-5e985d</loc>
    <lastmod>2026-05-08T08:09:44.374Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-canvas-hack-is-a-new-kind-of-ransomware-debacle-6a3382</loc>
    <lastmod>2026-05-08T06:09:49.060Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-patches-epmm-zero-day-exploited-in-targeted-attacks-6514c2</loc>
    <lastmod>2026-05-08T16:09:29.637Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-status-4a728d</loc>
    <lastmod>2026-05-08T03:09:25.317Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-defaces-canvas-lms-portal-thousands-of-universities-affected-2b80bc</loc>
    <lastmod>2026-05-08T01:09:33.751Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/indian-real-estate-firm-allegedly-being-sold-as-azure-ad-server-admin-access-a-t-aedff8</loc>
    <lastmod>2026-05-08T00:10:01.360Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canvas-login-portals-hacked-in-mass-shinyhunters-extortion-campaign-a56f93</loc>
    <lastmod>2026-05-08T00:07:16.398Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-tclbanker-malware-self-spreads-over-whatsapp-and-outlook-6dd857</loc>
    <lastmod>2026-05-08T01:07:20.777Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/here-is-the-list-of-every-school-district-college-and-university-impacted-by-the-605386</loc>
    <lastmod>2026-05-07T23:06:48.104Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/after-replacing-teampcp-malware-pcpjack-steals-cloud-secrets-64c5da</loc>
    <lastmod>2026-05-07T22:06:34.766Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-fake-claude-ai-site-to-infect-users-with-new-beagle-malware-3a8dcb</loc>
    <lastmod>2026-05-08T15:06:34.825Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/users-of-instructure-are-currently-logging-into-canvas-with-a-shinyhunters-messa-def6a8</loc>
    <lastmod>2026-05-07T21:05:17.532Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/deezer-allegedly-leaked-exposing-2-5-million-russian-user-records-from-the-frenc-5315da</loc>
    <lastmod>2026-05-07T21:06:14.650Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/australia-warns-of-clickfix-attacks-pushing-vidar-stealer-malware-21b7b8</loc>
    <lastmod>2026-05-13T03:10:06.929Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomhouse-has-claimed-trellix-https-t-co-ohogpcoq3d-https-t-co-ijuvrfcvz9-636ca4</loc>
    <lastmod>2026-05-13T02:10:04.667Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lab52-released-a-paper-on-apt29-and-suspected-state-sponsored-computer-espionage-958074</loc>
    <lastmod>2026-05-13T03:09:49.098Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/multiple-chilean-cl-websites-allegedly-being-sold-as-access-by-pharaoh-s-team-ma-7b4c01</loc>
    <lastmod>2026-05-10T10:10:05.133Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-warns-of-new-epmm-zero-day-exploited-using-credentials-stolen-in-january--12dffb</loc>
    <lastmod>2026-05-10T12:10:05.003Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-acf8a2</loc>
    <lastmod>2026-05-07T18:09:40.241Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/maxhub-pivot-client-application-cd5929</loc>
    <lastmod>2026-05-07T18:09:48.778Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/homes-real-estate-platform-allegedly-leaked-exposing-7-million-agent-and-investo-58cf69</loc>
    <lastmod>2026-05-07T17:09:33.980Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pcpjack-cloud-worm-evicts-teampcp-and-steals-credentials-at-scale-5895bb</loc>
    <lastmod>2026-05-07T17:09:16.967Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/what-pcpjack-does-after-it-wins-the-turf-war-steals-cloud-credentials-across-aws-c3ca3a</loc>
    <lastmod>2026-05-07T17:07:54.493Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-are-in-a-turf-war-for-ownership-of-your-infrastructure-labssentine-ac0e4a</loc>
    <lastmod>2026-05-07T17:08:26.037Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researcher-shows-edge-browser-stores-saved-passwords-in-plaintext-315eaf</loc>
    <lastmod>2026-05-07T16:06:46.119Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-non-emergency-medical-transport-network-allegedly-breached-exposing-500k-pati-664712</loc>
    <lastmod>2026-05-12T09:10:01.316Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/antel-tuid-digital-allegedly-breached-exposing-8gb-of-data-from-the-uruguayan-st-4b4c08</loc>
    <lastmod>2026-05-07T16:06:36.851Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-non-emergency-medical-transport-network-allegedly-breached-exposing-500k-pati-9bef30</loc>
    <lastmod>2026-05-07T16:08:03.424Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/antel-tuid-digital-allegedly-breached-exposing-8gb-of-data-from-the-uruguayan-st-317da4</loc>
    <lastmod>2026-05-07T16:08:09.061Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-zero-day-exploited-in-campaign-bearing-hallmarks-of-chinese-state-hack-e67168</loc>
    <lastmod>2026-05-07T16:07:09.667Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-code-oauth-tokens-can-be-stolen-through-stealthy-mcp-hijacking-eb2ef5</loc>
    <lastmod>2026-05-07T16:07:43.838Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chrome-148-rolls-out-with-127-security-fixes-0775ae</loc>
    <lastmod>2026-05-07T16:07:52.905Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/that-ai-extension-helping-you-write-emails-it-s-reading-them-first-4b2ec5</loc>
    <lastmod>2026-05-07T15:06:48.843Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/laboratorios-ceflo-allegedly-breached-exposing-21k-positive-hiv-syphilis-and-cov-a9912b</loc>
    <lastmod>2026-05-12T07:10:04.359Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/belgian-sports-fitness-chain-allegedly-breached-exposing-105k-customer-records-w-fb56c4</loc>
    <lastmod>2026-05-12T07:09:55.185Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/laboratorios-ceflo-allegedly-breached-exposing-21k-positive-hiv-syphilis-and-cov-8c9d63</loc>
    <lastmod>2026-05-07T15:08:40.664Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/belgian-sports-fitness-chain-allegedly-breached-exposing-105k-customer-records-w-a7b76c</loc>
    <lastmod>2026-05-07T15:08:47.709Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-leverage-llms-to-accelerate-development-of-malicious-browser-exten-6bdfb6</loc>
    <lastmod>2026-05-07T15:08:54.473Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/american-duo-sentenced-for-hosting-laptop-farms-for-north-korean-it-workers-b2f210</loc>
    <lastmod>2026-05-07T14:09:45.690Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/americans-sentenced-for-running-laptop-farms-for-north-korea-07800f</loc>
    <lastmod>2026-05-07T14:08:47.336Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-edge-plaintext-passwords-ics-0-days-patch-or-die-alerts-and--2f7a3d</loc>
    <lastmod>2026-05-11T23:10:05.296Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pan-os-rce-exploit-under-active-use-enabling-root-access-and-espionage-ca4281</loc>
    <lastmod>2026-05-11T23:09:54.980Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attackers-could-exploit-ai-vision-models-using-imperceptible-image-changes-31ab33</loc>
    <lastmod>2026-05-07T14:08:18.973Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vendor-says-daemon-tools-supply-chain-attack-contained-ca687a</loc>
    <lastmod>2026-05-07T14:08:29.293Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-coding-agents-could-fuel-next-supply-chain-crisis-031f1c</loc>
    <lastmod>2026-05-07T14:08:39.731Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/world-password-day-2026-the-credential-crisis-hasn-t-gone-away-it-s-just-got-mor-13a614</loc>
    <lastmod>2026-05-11T17:10:01.548Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trustfall-convention-exposes-claude-code-execution-risk-46fb20</loc>
    <lastmod>2026-05-07T14:08:09.544Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/looks-the-outlook-web-app-of-mpumalanga-department-of-social-development-a-provi-236089</loc>
    <lastmod>2026-05-07T13:07:12.189Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/thousands-of-vibe-coded-apps-expose-corporate-and-personal-data-on-the-open-web-dda907</loc>
    <lastmod>2026-05-07T12:08:12.871Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-patches-high-severity-vulnerabilities-in-enterprise-products-94beed</loc>
    <lastmod>2026-05-07T12:07:55.828Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gemini-cli-vulnerability-could-have-led-to-code-execution-supply-chain-attack-63c86a</loc>
    <lastmod>2026-05-07T12:08:04.487Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-chrome-accused-of-silently-installing-4gb-ai-model-on-user-devices-1ae03f</loc>
    <lastmod>2026-05-07T12:07:17.101Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-outdated-maintenance-software-is-a-growing-ransomware-risk-d01504</loc>
    <lastmod>2026-05-07T12:07:25.678Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scammers-use-hidden-text-to-bypass-ai-email-filters-in-phishing-scams-8eddd5</loc>
    <lastmod>2026-05-07T12:07:34.941Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-firewall-zero-day-exploited-for-nearly-a-month-8d93ec</loc>
    <lastmod>2026-05-07T12:06:59.450Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-claude-ai-website-delivers-new-beagle-windows-malware-c6cfec</loc>
    <lastmod>2026-05-07T20:07:15.187Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pypi-packages-deliver-zichatbot-malware-via-zulip-apis-on-windows-and-linux-c425e1</loc>
    <lastmod>2026-05-11T06:10:01.729Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/another-day-another-suspicious-whql-signed-driver-we-identified-a-signed-sample--542462</loc>
    <lastmod>2026-05-07T10:06:51.858Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion-c56b25</loc>
    <lastmod>2026-05-07T08:09:20.383Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/moreideas-general-trading-allegedly-re-leaked-exposing-787-217-student-records-f-f7d5bb</loc>
    <lastmod>2026-05-07T00:06:41.540Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-may-6th-2026-d02042</loc>
    <lastmod>2026-05-10T10:09:56.661Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing-9cc5e6</loc>
    <lastmod>2026-05-06T22:07:44.521Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yet-another-way-to-bypass-google-chrome-s-encryption-protection-bbbb5b</loc>
    <lastmod>2026-05-06T22:07:27.244Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-breach-exposes-schools-vendor-dependence-91b5b7</loc>
    <lastmod>2026-05-06T22:07:34.706Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dod-contractor-s-api-flaw-exposed-military-course-data-and-service-member-reco-b0ae0a</loc>
    <lastmod>2026-05-06T22:07:20.567Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/leroy-merlin-france-allegedly-leaked-exposing-367-462-loyalty-program-records-a--117492</loc>
    <lastmod>2026-05-06T22:05:54.564Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/transmitenota-allegedly-leaked-exposing-20-million-records-from-the-brazilian-e--991292</loc>
    <lastmod>2026-05-06T22:06:00.604Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-this-wired-video-about-fast16-a-greenberg-walks-through-the-whole-arc-a-2005--04aec2</loc>
    <lastmod>2026-05-06T22:06:36.743Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-fixes-cvss-10-gemini-cli-vulnerability-enabling-github-issue-based-rce-77b18f</loc>
    <lastmod>2026-05-06T22:05:17.904Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nrj-mobile-allegedly-leaked-exposing-266k-customer-records-from-the-french-mvno--85a0a8</loc>
    <lastmod>2026-05-06T21:06:07.535Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts-d07794</loc>
    <lastmod>2026-05-06T20:09:43.351Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices-7f7e51</loc>
    <lastmod>2026-05-06T21:09:39.598Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-critical-palo-alto-pan-os-zero-day-is-being-exploited-in-the-wild-d0e08b</loc>
    <lastmod>2026-05-06T20:09:34.447Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-argentine-government-and-https-t-co-0cuzke1ybc-allegedly-breached-exposing-8-2cc5d3</loc>
    <lastmod>2026-05-06T20:09:18.668Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nimrod-stealer-source-code-allegedly-shared-on-a-hacking-forum-for-credential-an-652ed4</loc>
    <lastmod>2026-05-06T20:08:16.563Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cacpe-pastaza-allegedly-breached-exposing-18-million-ecuadorian-civil-registry-r-8fdf3a</loc>
    <lastmod>2026-05-06T20:08:23.730Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-c2651e</loc>
    <lastmod>2026-05-06T20:08:08.485Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cloudz-rat-a-stealthy-new-trojan-hijacks-microsoft-phone-link-to-steal-your-sms--5cec9d</loc>
    <lastmod>2026-05-06T19:08:13.132Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cloudz-rat-a-stealthy-new-trojan-hijacks-microsoft-phone-link-to-steal-your-sms--b4d902</loc>
    <lastmod>2026-05-06T19:07:58.101Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nuclei-template-for-fingerprinting-the-pan-os-cve-2026-0300-zero-day-https-t-co--a39e62</loc>
    <lastmod>2026-05-06T19:07:50.890Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daemon-tools-devs-confirm-breach-release-malware-free-version-4e8fc4</loc>
    <lastmod>2026-05-06T18:08:03.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/clickfix-campaign-uses-fake-macos-utilities-lures-to-deliver-infostealers-d08e65</loc>
    <lastmod>2026-05-10T07:07:33.091Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-apache-http-2-double-free-flaw-enables-denial-of-service-and-potential--395037</loc>
    <lastmod>2026-05-06T18:06:53.349Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-apache-http-2-double-free-flaw-enables-denial-of-service-and-potential--15ec5c</loc>
    <lastmod>2026-05-06T18:06:29.577Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-instructure-canvas-lms-and-vimeo-breaches-impact-millions-of-users-873c77</loc>
    <lastmod>2026-05-06T18:06:14.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cemig-allegedly-breached-exposing-a-190gb-watson-instance-dump-from-the-brazilia-59ff99</loc>
    <lastmod>2026-05-06T17:05:52.772Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vip-buenaventura-allegedly-leaked-exposing-70-000-user-records-from-the-colombia-488178</loc>
    <lastmod>2026-05-06T17:06:07.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-at-1c07d8</loc>
    <lastmod>2026-05-11T07:09:41.263Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attacks-abuse-windows-phone-link-to-steal-texts-amp-bypass-2fa-d204cc</loc>
    <lastmod>2026-05-06T16:06:19.956Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/before-the-breach-there-was-a-test-environment-149dd9</loc>
    <lastmod>2026-05-06T16:06:04.054Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-warns-of-actively-exploited-pan-os-zero-day-granting-root-acc-3418ad</loc>
    <lastmod>2026-05-06T16:05:44.306Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-warns-of-actively-exploited-pan-os-zero-day-granting-root-acc-75855c</loc>
    <lastmod>2026-05-06T17:09:57.297Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/caf-caisse-d-allocations-familiales-allegedly-breached-exposing-22-million-recor-39cc66</loc>
    <lastmod>2026-05-06T16:05:26.970Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iungo-cloud-https-t-co-ntf9is6zqq-allegedly-leaked-exposing-21m-corporate-email--d12c4a</loc>
    <lastmod>2026-05-06T23:09:29.543Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/croesus-https-t-co-9asmdytkzk-allegedly-breached-exposing-19-220-canadian-user-r-79dc02</loc>
    <lastmod>2026-05-08T22:10:00.401Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kgi-https-t-co-ls4xabndqk-allegedly-breached-exposing-5m-hong-kong-stock-investo-090fad</loc>
    <lastmod>2026-05-09T13:09:56.445Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-apt-intrusion-masquerades-as-chaos-ransomware-attack-39a94d</loc>
    <lastmod>2026-05-06T15:05:18.970Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attacks-ef778c</loc>
    <lastmod>2026-05-08T07:08:37.387Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oceanlotus-suspected-of-using-pypi-to-deliver-zichatbot-malware-e65fb4</loc>
    <lastmod>2026-05-06T14:08:42.260Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-critical-infrastructure-must-master-isolation-recovery-ac8632</loc>
    <lastmod>2026-05-06T13:09:45.379Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rowhammer-attack-against-nvidia-chips-schneier-on-security-057696</loc>
    <lastmod>2026-05-09T21:09:51.281Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/my-favorite-remus-botnet-c2-domain-so-far-havelbeenpwned-net-nicenic-internation-f501ed</loc>
    <lastmod>2026-05-06T11:08:29.175Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rowhammer-attack-against-nvidia-chips-https-t-co-xyv2kenohd-9fb978</loc>
    <lastmod>2026-05-06T11:08:22.767Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sophisticated-quasar-linux-rat-targets-software-developers-1a9655</loc>
    <lastmod>2026-05-06T10:09:24.386Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/government-scientific-entities-hit-via-daemon-tools-supply-chain-attack-a5bd7c</loc>
    <lastmod>2026-05-06T10:09:36.018Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-warns-of-firewall-rce-zero-day-exploited-in-attacks-52262c</loc>
    <lastmod>2026-05-06T10:09:07.231Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-s-android-apps-get-public-verification-to-stop-supply-chain-attacks-6297cd</loc>
    <lastmod>2026-05-06T10:08:41.938Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/windows-phone-link-exploited-by-cloudz-rat-to-steal-credentials-and-otps-2f2d59</loc>
    <lastmod>2026-05-06T11:08:09.821Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/quasar-linux-qlnx-a-silent-foothold-in-the-supply-chain-inside-a-full-featured-l-6a7fa6</loc>
    <lastmod>2026-05-06T10:08:26.774Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/just-saw-this-quasar-linux-qlnx-a-silent-foothold-in-the-supply-chain-inside-a-f-0dc676</loc>
    <lastmod>2026-05-06T09:08:14.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/massive-low-and-slow-ddos-attack-hits-platform-with-2-45-billion-in-5-hours-da24cd</loc>
    <lastmod>2026-05-06T08:05:49.877Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution-2c5838</loc>
    <lastmod>2026-05-06T08:05:39.973Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firewalls-46140f</loc>
    <lastmod>2026-05-06T06:05:16.520Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weekly-update-502-5e7ed3</loc>
    <lastmod>2026-05-07T11:09:59.885Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-stealthy-quasar-linux-malware-targets-software-developers-edc299</loc>
    <lastmod>2026-05-06T01:09:39.256Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-what-you-need-to-know-about-the-most-severe-linux-threat-in-years-89c04a</loc>
    <lastmod>2026-05-06T00:09:59.523Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/blackwater-ransomware-chat-portal-http-6t5g73fbzdjuhvvovuvuhc4mdgefrwn75szssx4ft-e43812</loc>
    <lastmod>2026-05-06T00:09:42.181Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-cve-2026-31431-is-a-critical-privilege-escalation-in-the-linux-kernel--bf04f4</loc>
    <lastmod>2026-05-06T00:09:48.480Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-source-code-breach-highlights-growing-supply-chain-threats-9be942</loc>
    <lastmod>2026-05-05T22:09:30.571Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-hacker-claims-data-theft-from-8-800-schools-universities-290b29</loc>
    <lastmod>2026-05-05T22:09:15.383Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-report-amazon-ses-abused-in-phishing-to-evade-detection-3a66f8</loc>
    <lastmod>2026-05-05T22:09:23.694Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-wants-critical-infrastructure-to-operate-weeks-to-months-in-isolation-durin-bd6041</loc>
    <lastmod>2026-05-05T22:09:07.343Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-c2-infrastructure-and-lures-detected-associated-with-coruna-and-darksword-ma-fcf64a</loc>
    <lastmod>2026-05-05T22:08:59.059Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/most-of-you-have-probably-already-seen-the-reports-about-the-daemon-tools-supply-bb0779</loc>
    <lastmod>2026-05-07T05:09:46.947Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dolphin-x-a-new-all-in-one-windows-rat-advertised-with-over-600-functions-is-all-2b4035</loc>
    <lastmod>2026-05-07T02:10:02.389Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-b-r-automation-studio-71bd29</loc>
    <lastmod>2026-05-06T02:09:57.860Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-b-r-automation-runtime-549754</loc>
    <lastmod>2026-05-06T03:09:56.002Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hitachi-energy-pcm600-7058bf</loc>
    <lastmod>2026-05-06T04:09:43.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/johnson-controls-cem-ac2000-ec2397</loc>
    <lastmod>2026-05-06T04:09:51.981Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-b-r-pvi-e6f942</loc>
    <lastmod>2026-05-06T04:10:00.126Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daemon-tools-trojanized-in-supply-chain-attack-to-deploy-backdoor-d9aeea</loc>
    <lastmod>2026-05-05T23:10:00.149Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-miss-e2113c</loc>
    <lastmod>2026-05-06T01:09:58.834Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-targeting-list-pairing-cryptocurrency-wallet-addresses-with-twitter-x-username-2c383b</loc>
    <lastmod>2026-05-05T21:10:00.147Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-offering-for-sale-an-unpatched-boolean-based-blind-sql-injecti-a2af6b</loc>
    <lastmod>2026-05-05T20:09:42.908Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daemon-tools-supply-chain-attack-compromises-official-installers-with-malware-951945</loc>
    <lastmod>2026-05-05T20:09:26.562Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-potential-rce-b1549c</loc>
    <lastmod>2026-05-05T19:09:57.010Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/student-hacked-taiwan-high-speed-rail-to-trigger-emergency-brakes-221197</loc>
    <lastmod>2026-05-05T19:09:48.721Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/latvian-national-sentenced-for-ransomware-attacks-run-by-former-conti-leaders-11ab38</loc>
    <lastmod>2026-05-06T23:09:13.701Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-released-the-list-of-the-9-000-schools-affected-by-the-instructure--2c4781</loc>
    <lastmod>2026-05-05T19:09:31.412Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-rce-flaw-actively-exploited-via-exposed-debug-api-f6b372</loc>
    <lastmod>2026-05-05T19:09:04.383Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-rce-flaw-actively-exploited-via-exposed-debug-api-https-t-co-toy-46ffdb</loc>
    <lastmod>2026-05-05T18:09:48.656Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/imss-banco-de-sangre-the-blood-bank-of-mexico-s-instituto-mexicano-del-seguro-so-ebef77</loc>
    <lastmod>2026-05-05T18:10:00.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-edge-stores-passwords-in-process-memory-posing-enterprise-risk-027e3d</loc>
    <lastmod>2026-05-05T18:09:33.023Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ftc-to-ban-data-broker-kochava-from-selling-americans-location-data-a02c9d</loc>
    <lastmod>2026-05-05T16:10:02.252Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-don-t-check-f3a792</loc>
    <lastmod>2026-05-05T17:09:04.985Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-warns-of-sophisticated-phishing-campaign-targeting-us-organizations-40c953</loc>
    <lastmod>2026-05-05T17:09:24.846Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bvwg-w298-2323263-1-11e-396aa1</loc>
    <lastmod>2026-05-05T17:09:57.956Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-0073-zero-click-rce-flaw-in-android-x27-s-wireless-adb-bypasses-authent-149895</loc>
    <lastmod>2026-05-05T17:09:14.232Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-pw0avxeu0k-a-french-language-assessment-platform-has-allegedly-been-b-c37960</loc>
    <lastmod>2026-05-05T16:09:25.740Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-0073-zero-click-rce-flaw-in-android-s-wireless-adb-bypasses-authenticat-c3ef3a</loc>
    <lastmod>2026-05-05T16:09:44.350Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/phishlab-v1-a-new-phishing-as-a-service-panel-is-allegedly-being-sold-on-a-hacki-951b93</loc>
    <lastmod>2026-05-05T16:09:18.319Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-blacknet-00-a-new-ransomware-builder-platform-is-allegedly-being-sold-on-a-h-679cfd</loc>
    <lastmod>2026-05-05T16:09:34.923Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/finger-protocol-lolbin-clickfix-campaign-that-uses-fake-ai-tools-background-remo-8333f0</loc>
    <lastmod>2026-05-05T16:09:54.847Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-digercic-direccion-general-de-registro-civil-identificacion-y-cedulacion-the-b81fdc</loc>
    <lastmod>2026-05-05T15:08:56.664Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vimeo-data-breach-exposes-personal-information-of-119-000-people-69c1a2</loc>
    <lastmod>2026-05-09T17:10:01.495Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-bug-could-expose-300-000-ollama-deployments-to-information-theft-c3fd45</loc>
    <lastmod>2026-05-05T15:08:09.521Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ci-fortify-cisa-5a388f</loc>
    <lastmod>2026-05-05T14:08:09.418Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anti-ice-site-gtfo-ice-accused-of-exposing-data-of-17-000-activists-e79407</loc>
    <lastmod>2026-05-05T14:08:49.510Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anti-tampering-kernel-driver-deep-dive-we-have-found-an-interesting-whql-signed--7e6e65</loc>
    <lastmod>2026-05-05T14:08:24.194Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-back-door-attackers-know-about-and-most-security-teams-still-haven-t-closed-e8d6c3</loc>
    <lastmod>2026-05-05T14:06:18.565Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/metinfo-cms-cve-2026-29014-exploited-for-remote-code-execution-attacks-a87226</loc>
    <lastmod>2026-05-05T14:08:00.586Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/proton-mail-rolls-out-post-quantum-encryption-for-all-users-as-industry-braces-f-010230</loc>
    <lastmod>2026-05-09T15:10:00.272Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-now-offers-up-to-1-5-million-for-some-android-exploits-31b2bc</loc>
    <lastmod>2026-05-09T07:09:56.612Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/karakurt-extortion-gang-cold-case-negotiator-gets-8-5-years-in-prison-a39b85</loc>
    <lastmod>2026-05-09T09:10:01.282Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cloudz-malware-abuses-microsoft-phone-link-to-steal-sms-and-otps-2ca225</loc>
    <lastmod>2026-05-09T11:09:53.631Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-remote-code-execution-vulnerability-patched-in-android-9501fe</loc>
    <lastmod>2026-05-09T00:09:50.663Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/karakurt-ransomware-negotiator-sentenced-to-prison-d92cc7</loc>
    <lastmod>2026-05-09T04:09:57.200Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/femitbot-network-abuses-telegram-mini-apps-for-crypto-scams-and-android-malware-756a13</loc>
    <lastmod>2026-05-08T20:09:51.304Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/and-smica83-uploaded-some-related-samples-to-bazaar-https-t-co-wqojm1hv75-and-as-477c7d</loc>
    <lastmod>2026-05-08T20:10:01.964Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-scanned-1-million-exposed-ai-services-here-s-how-bad-the-security-actually-is-b41605</loc>
    <lastmod>2026-05-08T05:10:05.044Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/darksword-malware-schneier-on-security-cdc190</loc>
    <lastmod>2026-05-07T06:09:57.835Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-on-android-and-window-106d58</loc>
    <lastmod>2026-05-06T02:09:49.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scarcruft-hackers-push-birdcall-android-malware-via-game-platform-ca1775</loc>
    <lastmod>2026-05-06T03:09:47.431Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/metinfo-weaver-e-cology-vulnerabilities-in-attackers-crosshairs-bbe967</loc>
    <lastmod>2026-05-06T05:09:58.369Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/whatsapp-discloses-file-spoofing-arbitrary-url-scheme-vulnerabilities-21e426</loc>
    <lastmod>2026-05-06T06:10:03.715Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ts-1590-2026-fe9b6a</loc>
    <lastmod>2026-05-05T11:09:48.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/popular-daemon-tools-software-compromised-1e4528</loc>
    <lastmod>2026-05-05T23:09:50.674Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kaspersky-just-published-an-article-titled-daemon-tools-software-infected-supply-6ceebf</loc>
    <lastmod>2026-05-05T10:09:48.827Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-rce-flaw-cve-2026-22679-actively-exploited-via-debug-api-61b0c3</loc>
    <lastmod>2026-05-05T08:09:34.973Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-details-phishing-campaign-targeting-35-000-users-across-26-countries-edbc17</loc>
    <lastmod>2026-05-05T10:09:25.808Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/linkedin-locks-your-gdpr-rights-behind-a-paywall-7fa734</loc>
    <lastmod>2026-05-05T06:09:31.722Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-critical-bug-exploited-in-attacks-since-march-0a1b8c</loc>
    <lastmod>2026-05-05T00:09:24.631Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iungo-cloud-https-t-co-ntf9is6zqq-a-brazilian-cloud-telephony-operator-has-alleg-010b01</loc>
    <lastmod>2026-05-04T23:09:29.209Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rmm-tools-fuel-stealthy-phishing-campaign-398088</loc>
    <lastmod>2026-05-04T22:09:57.925Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploit-cyber-frenzy-threatens-millions-via-critical-cpanel-vulnerability-dcb5d5</loc>
    <lastmod>2026-05-04T22:10:04.589Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/amazon-ses-increasingly-abused-in-phishing-to-evade-detection-94b68f</loc>
    <lastmod>2026-05-04T22:09:52.078Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-is-a-real-linux-security-crisis-wrapped-in-ai-slop-f0ff62</loc>
    <lastmod>2026-05-04T22:09:39.997Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/latvian-national-deniss-zolotarjovs-sentenced-to-102-months-8-5-yrs-for-his-role-ef8ad8</loc>
    <lastmod>2026-05-04T21:09:28.373Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/johnson-amp-johnson-innovative-medicine-has-been-claimed-a-victim-to-spacebears--f08f8c</loc>
    <lastmod>2026-05-04T21:09:41.247Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenconnect-rmm-tools-c26330</loc>
    <lastmod>2026-05-05T08:09:08.553Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/la-redoute-a-major-french-e-commerce-and-home-goods-retailer-has-allegedly-been--abce8a</loc>
    <lastmod>2026-05-04T20:09:26.883Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-a-screensaver-cracked-the-internet-x27-s-trust-layer-inside-the-digicert-ha-8e4754</loc>
    <lastmod>2026-05-09T07:09:10.335Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bouygues-telecom-one-of-france-s-largest-telecommunications-providers-has-allege-42b2ef</loc>
    <lastmod>2026-05-04T19:09:41.158Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-a-screensaver-cracked-the-internet-s-trust-layer-inside-the-digicert-hack-h-e46076</loc>
    <lastmod>2026-05-04T19:10:00.864Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zurich-insurance-has-allegedly-been-breached-with-a-massive-leak-containing-over-29c17c</loc>
    <lastmod>2026-05-04T20:09:12.938Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/progress-patches-critical-moveit-automation-bug-enabling-authentication-bypass-b746b9</loc>
    <lastmod>2026-05-04T19:09:33.581Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-source-code-repository-breached-318560</loc>
    <lastmod>2026-05-04T19:09:07.266Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-to-6aa915</loc>
    <lastmod>2026-05-04T18:09:47.151Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/backdoored-pytorch-lightning-package-drops-credential-stealer-09d8ee</loc>
    <lastmod>2026-05-04T19:09:16.556Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-discloses-data-breach-after-source-code-repository-hack-b90760</loc>
    <lastmod>2026-05-04T19:09:25.814Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-lands-on-cisa-x27-s-kev-a-nine-year-old-linux-bug-becomes-a-patch-dead-77bdca</loc>
    <lastmod>2026-05-04T18:09:20.015Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-lands-on-cisa-s-kev-a-nine-year-old-linux-bug-becomes-a-patch-deadline-24648b</loc>
    <lastmod>2026-05-04T18:09:10.927Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-watchman-gets-watched-trellix-discloses-source-code-breach-780291</loc>
    <lastmod>2026-05-04T17:09:56.630Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-watchman-gets-watched-trellix-discloses-source-code-breach-https-t-co-d-953ac4</loc>
    <lastmod>2026-05-04T17:09:42.847Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/groupe-cga-a-french-automotive-dealership-group-has-allegedly-been-breached-with-c7df3b</loc>
    <lastmod>2026-05-04T17:09:49.207Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weekly-recap-ai-powered-phishing-android-spying-tool-linux-exploit-github-rce-mo-4916cb</loc>
    <lastmod>2026-05-12T02:08:47.247Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silver-fox-springs-tax-themed-attacks-on-orgs-in-india-russia-2438a4</loc>
    <lastmod>2026-05-04T17:09:19.061Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dhs-demanded-google-surrender-data-on-canadian-s-activity-location-over-anti-ice-e55d56</loc>
    <lastmod>2026-05-04T17:09:27.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fund-for-teachers-https-t-co-hllp6fkjdx-a-u-s-nonprofit-that-provides-grants-to--2cfab5</loc>
    <lastmod>2026-05-04T16:09:22.688Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-new-ivr-interactive-voice-response-0day-automation-tool-is-allegedly-being-sol-e74480</loc>
    <lastmod>2026-05-04T16:09:45.744Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/an-egyptian-database-containing-1-5-million-student-records-and-a-60-million-rec-f63017</loc>
    <lastmod>2026-05-04T16:10:00.204Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/wiz-zeroday-cloud-event-reveals-20-year-old-postgresql-vulnerabilities-9f850b</loc>
    <lastmod>2026-05-04T16:09:14.221Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-in-india-and-russia-21b52b</loc>
    <lastmod>2026-05-04T14:09:47.930Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/2026-the-year-of-ai-assisted-attacks-662779</loc>
    <lastmod>2026-05-04T15:09:03.074Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/digicert-revokes-certificates-after-support-portal-hack-65987f</loc>
    <lastmod>2026-05-04T14:09:29.122Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/progress-warns-of-critical-moveit-automation-auth-bypass-flaw-c40693</loc>
    <lastmod>2026-05-04T14:09:07.598Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security-f44ef3</loc>
    <lastmod>2026-05-04T12:09:45.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-vulnerability-weaponized-to-target-government-and-msp-networks-cf23c5</loc>
    <lastmod>2026-05-05T01:09:58.400Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploitation-of-copy-fail-linux-vulnerability-begins-896440</loc>
    <lastmod>2026-05-05T01:09:58.213Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-says-copy-fail-flaw-now-exploited-to-root-linux-systems-6c99d8</loc>
    <lastmod>2026-05-05T01:09:58.007Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-confirms-april-windows-updates-cause-backup-failures-7032f6</loc>
    <lastmod>2026-05-04T12:09:08.471Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-data-centers-now-belong-on-the-critical-infrastructure-list-f9074e</loc>
    <lastmod>2026-05-04T12:08:44.045Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-40-000-servers-compromised-in-ongoing-cpanel-exploitation-7d4f23</loc>
    <lastmod>2026-05-05T01:09:57.802Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/global-crackdown-arrests-276-shuts-9-crypto-scam-centers-seizes-701m-07e616</loc>
    <lastmod>2026-05-04T08:08:03.717Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/edtech-firm-instructure-discloses-data-breach-amid-hacker-leak-threats-986cf7</loc>
    <lastmod>2026-05-04T08:07:46.547Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fixes-available-for-cve-2026-31431-copy-fail-linux-kernel-local-privilege-escala-7c8cda</loc>
    <lastmod>2026-05-05T01:09:57.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-confirms-data-breach-shinyhunters-claims-attack-e98fb1</loc>
    <lastmod>2026-05-04T00:06:25.535Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-egyptian-ministry-of-manpower-ministry-of-labour-has-allegedly-been-breached-afb6d9</loc>
    <lastmod>2026-05-04T07:09:39.552Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/psycho-prat-ecole-de-psychologues-praticiens-a-french-psychology-school-has-alle-68b602</loc>
    <lastmod>2026-05-03T23:09:43.113Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-41940-a-high-performance-multi-threaded-security-auditing-tool-designed-098ab2</loc>
    <lastmod>2026-05-04T06:10:01.213Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/i-have-posted-several-of-these-here-is-another-cpanel-whm-poc-cve-2026-41940-cpa-7aa981</loc>
    <lastmod>2026-05-04T06:10:01.094Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zenmobile-https-t-co-hrg8xe7vu2-a-french-mobile-virtual-network-operator-mvno-ha-827747</loc>
    <lastmod>2026-05-04T05:09:59.900Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-defender-wrongly-flags-digicert-certs-as-trojan-win32-cerdigent-a-dha-4de013</loc>
    <lastmod>2026-05-03T21:09:59.751Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/crocs-israel-https-t-co-kyvbxkw7ag-the-israeli-branch-of-the-global-footwear-bra-25877a</loc>
    <lastmod>2026-05-04T05:09:49.272Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/senzing-https-t-co-ye06b8skxk-a-u-s-based-ai-software-company-specializing-in-ha-add924</loc>
    <lastmod>2026-05-04T05:09:38.666Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/actradis-https-t-co-akxt4thf3g-a-french-b2b-compliance-and-administrative-docume-18889c</loc>
    <lastmod>2026-05-04T04:09:43.118Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/paying-ransom-won-t-help-as-vect-2-0-ransomware-destroys-data-irreversibly-ea4cb6</loc>
    <lastmod>2026-05-03T18:06:36.217Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/profil-search-a-french-recruitment-platform-cdd-cdi-solutions-has-allegedly-been-d3b7f5</loc>
    <lastmod>2026-05-04T02:09:56.431Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ontario-college-of-health-amp-technology-has-allegedly-been-breached-with-studen-566e55</loc>
    <lastmod>2026-05-04T01:10:01.719Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/telegram-mini-apps-abused-for-crypto-scams-android-malware-delivery-78a60b</loc>
    <lastmod>2026-05-03T22:09:58.461Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-egyptian-ministry-of-manpower-ministry-of-labour-has-allegedly-been-breached-496784</loc>
    <lastmod>2026-05-03T22:09:48.890Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/minimed-panama-the-largest-private-primary-healthcare-network-in-panama-has-alle-7aab88</loc>
    <lastmod>2026-05-03T20:09:58.116Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev-e673c1</loc>
    <lastmod>2026-05-04T06:10:00.958Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-czppxo8djq-a-french-government-health-related-platform-has-allegedly--4fccf7</loc>
    <lastmod>2026-05-03T17:09:45.082Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-41940-webpros-cpanel-and-whm-authentication-bypass-via-login-flow-poc-h-1c5afa</loc>
    <lastmod>2026-05-02T23:06:05.100Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-cpanel-situation-is-spiraling-fast-on-april-29-cve-2026-41940-was-disclosed--d6b951</loc>
    <lastmod>2026-05-03T15:10:00.567Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanelsniper-cve-2026-41940-cpanel-amp-whm-authentication-bypass-via-session-fil-8423e4</loc>
    <lastmod>2026-05-03T15:09:53.467Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critrical-cpanel-flaw-mass-exploited-in-sorry-ransomware-attacks-01b497</loc>
    <lastmod>2026-05-02T22:06:04.203Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-appsheet-exploited-in-30-000-user-facebook-phishing-operation-e9ab45</loc>
    <lastmod>2026-05-02T20:05:52.621Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-known-as-nearlevrai-pwndlevrai-claims-to-have-exploited-a-sql-vul-68dc86</loc>
    <lastmod>2026-05-03T15:09:45.946Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/universidad-da-vinci-de-guatemala-has-allegedly-been-breached-with-a-massive-stu-9fb153</loc>
    <lastmod>2026-05-03T14:09:54.821Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/4vps-su-a-russian-service-provider-since-2017-used-by-forums-the-com-ransomware--047690</loc>
    <lastmod>2026-05-03T13:09:55.641Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fredrikstad-municipality-of-norway-https-t-co-zeurlp9mwa-has-allegedly-been-brea-63e669</loc>
    <lastmod>2026-05-03T12:09:52.169Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hospital-universitario-nacional-de-colombia-https-t-co-eca2wwrcsq-a-major-colomb-9e5cd6</loc>
    <lastmod>2026-05-03T12:09:59.141Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-quimarat-v2-0-0-a-new-cross-platform-java-based-rat-is-allegedly-being-sold--ec2d95</loc>
    <lastmod>2026-05-03T10:09:53.756Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/banco-de-machala-an-ecuadorian-bank-has-allegedly-been-breached-with-over-100-00-f09b36</loc>
    <lastmod>2026-05-03T12:09:45.728Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse-65bac2</loc>
    <lastmod>2026-05-02T16:07:26.708Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ransomware-group-and-ip-leak-cmd-organization-clearnet-cmdofficial-com-ip-20-864702</loc>
    <lastmod>2026-05-03T09:09:59.260Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/radimagen-panama-a-panamanian-medical-imaging-provider-has-allegedly-been-breach-107df9</loc>
    <lastmod>2026-05-02T18:09:43.807Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/clinica-hospital-panamericano-https-t-co-4a528yvilk-a-panamanian-hospital-has-al-bcd478</loc>
    <lastmod>2026-05-03T09:09:53.452Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/2-us-cybersecurity-experts-jailed-for-aiding-alphv-blackcat-ransomware-3920ab</loc>
    <lastmod>2026-05-02T14:05:58.280Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-bluekit-phishing-kit-features-ai-assistant-bd94af</loc>
    <lastmod>2026-05-03T07:09:57.527Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/disneyland-now-uses-face-recognition-on-visitors-fb6441</loc>
    <lastmod>2026-05-03T05:09:56.826Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation-a-ac3884</loc>
    <lastmod>2026-05-03T05:09:47.912Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kodex-law-enforcement-panel-accounts-are-allegedly-being-sold-providing-access-t-d41ec4</loc>
    <lastmod>2026-05-03T03:09:57.569Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/obfuscated-websocket-backdoors-are-injecting-credit-card-skimmers-into-hundreds--8adbbd</loc>
    <lastmod>2026-05-03T03:10:04.920Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/edu-tech-firm-instructure-discloses-cyber-incident-probes-impact-9cecf1</loc>
    <lastmod>2026-05-02T21:09:51.350Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dangerous-new-linux-exploit-gives-attackers-root-access-to-countless-computers-738696</loc>
    <lastmod>2026-05-03T01:09:47.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-airsnitch-attack-techniques-target-the-wi-fi-infrastructure-itself-we-show-h-219b1d</loc>
    <lastmod>2026-05-02T21:10:05.568Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/30-000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign-c476d0</loc>
    <lastmod>2026-05-02T20:10:01.761Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-18-ee5b96</loc>
    <lastmod>2026-05-02T17:10:04.880Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ugly-official-sap-npm-packages-compromised-in-supply-chain-attack-attackers-targ-3adcb0</loc>
    <lastmod>2026-05-02T18:09:51.513Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/authorities-extradited-a-silk-typhoon-linked-hacker-dismantled-a-50m-crypto-frau-f2c781</loc>
    <lastmod>2026-05-02T19:09:51.221Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/facoparis-a-french-educational-institution-has-allegedly-been-breached-with-a-12-6fcef7</loc>
    <lastmod>2026-05-02T13:10:05.777Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/good-alleged-silk-typhoon-hacker-extradited-to-the-u-s-for-cyberespionage-europe-a0b9be</loc>
    <lastmod>2026-05-02T18:10:05.571Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/45-000-attacks-5-300-backdoors-tied-to-china-linked-cybercrime-operation-ff7570</loc>
    <lastmod>2026-05-12T19:09:58.078Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-425b80</loc>
    <lastmod>2026-05-02T13:09:58.682Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/your-ai-agent-reads-a-resume-hidden-inside-a-command-to-steal-data-no-malware-ju-b63b13</loc>
    <lastmod>2026-05-02T12:09:50.883Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/15-year-old-detained-over-french-govt-agency-data-breach-f3a097</loc>
    <lastmod>2026-05-01T18:07:55.765Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-jenkins-access-to-deploy-ddos-botnet-against-gaming-servers-02b5da</loc>
    <lastmod>2026-05-02T09:09:51.372Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-what-is-advertised-as-the-full-internal-personnel-data-b2345c</loc>
    <lastmod>2026-05-02T10:09:43.188Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/jeddah-transport-company-https-t-co-ui3ikjyojf-a-saudi-arabian-transportation-co-d6af49</loc>
    <lastmod>2026-05-02T09:10:01.347Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-defense-evasion-tool-called-exengine-is-being-sold-as-a-service-marketed-as-an-493862</loc>
    <lastmod>2026-05-02T10:09:53.662Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/questrade-a-canadian-financial-services-company-offering-online-investing-and-tr-8c1b3f</loc>
    <lastmod>2026-05-02T06:09:56.429Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canonical-has-confirmed-they-and-ubuntu-are-under-a-ddos-attack-313-team-has-tak-1d26e0</loc>
    <lastmod>2026-05-01T17:08:46.823Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/madeindesign-https-t-co-72brs6en33-a-french-online-retailer-specializing-in-desi-3e0b8f</loc>
    <lastmod>2026-05-02T08:09:51.708Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/guia-de-moteis-https-t-co-yivt5szova-a-brazilian-online-motel-guide-and-reservat-272ece</loc>
    <lastmod>2026-05-02T06:10:03.102Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-scattered-spider-hacker-arrested-soc-effectiveness-metrics-nsa-too-537e5a</loc>
    <lastmod>2026-05-10T13:09:20.039Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks-783b2a</loc>
    <lastmod>2026-05-02T06:09:32.372Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kenlo-imob-formerly-ingaia-imob-a-leading-brazilian-real-estate-crm-used-by-brok-ad2aa9</loc>
    <lastmod>2026-05-02T00:09:53.913Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-tribunal-supremo-electoral-tse-guatemala-s-supreme-electoral-tribunal-has-al-7fcc85</loc>
    <lastmod>2026-05-02T00:09:42.333Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-cybersecurity-professionals-get-4-year-sentences-in-blackcat-ransomware-atta-5f9941</loc>
    <lastmod>2026-05-01T23:09:35.119Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-vulnerability-lets-attackers-bypass-login-gain-root-access-257b2c</loc>
    <lastmod>2026-05-01T12:07:58.373Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lessons-from-the-pocketos-incident-when-ai-agents-go-beyond-their-limits-a6c569</loc>
    <lastmod>2026-05-01T22:09:46.903Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-ransomware-negotiator-was-working-for-a-ransomware-gang-schneier-on-security-fd21bd</loc>
    <lastmod>2026-05-01T12:07:50.868Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-ransomware-negotiator-was-working-for-a-ransomware-gang-https-t-co-umwgtdb6di-566a34</loc>
    <lastmod>2026-05-01T20:10:01.081Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-us-security-experts-sentenced-to-prison-for-helping-ransomware-gang-a4584b</loc>
    <lastmod>2026-05-01T12:09:41.406Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sophisticated-deep-door-backdoor-enables-espionage-disruption-e58b99</loc>
    <lastmod>2026-05-01T20:09:31.694Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-releases-open-source-tool-for-ai-model-provenance-289f98</loc>
    <lastmod>2026-05-01T20:09:40.356Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/poisoned-ruby-gems-and-go-modules-exploit-ci-pipelines-for-credential-theft-25d2b3</loc>
    <lastmod>2026-05-04T01:09:29.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/preparing-for-a-vulnerability-patch-wave-f7729e</loc>
    <lastmod>2026-05-01T10:09:41.642Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hugging-face-clawhub-abused-for-malware-distribution-fabe26</loc>
    <lastmod>2026-05-01T10:08:56.908Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-warns-of-surge-in-hacker-enabled-cargo-theft-7b0940</loc>
    <lastmod>2026-05-01T10:09:33.568Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-ransomware-negotiators-get-4-years-in-prison-over-blackcat-attacks-e5bbbf</loc>
    <lastmod>2026-05-01T08:09:02.051Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-800-hit-in-mini-shai-hulud-attack-on-sap-lightning-intercom-f5f79a</loc>
    <lastmod>2026-05-01T08:08:07.885Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/clickfix-style-campaign-operated-eight-bulk-registered-588gj-shop-lure-domains-i-bc4a97</loc>
    <lastmod>2026-05-01T19:09:59.176Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/former-incident-responders-sentenced-to-4-years-in-prison-for-committing-ransomw-1373b0</loc>
    <lastmod>2026-05-01T19:09:50.263Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mini-shai-hulud-malware-reaches-packagist-through-compromised-intercom-php-packa-c4e875</loc>
    <lastmod>2026-05-01T19:09:39.999Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interesting-claim-a-threat-actor-operating-under-the-alias-paws-is-selling-root--81620a</loc>
    <lastmod>2026-05-01T18:09:58.935Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/private-chats-photos-of-celebs-exposed-in-suspected-stalkerware-leak-13bbb3</loc>
    <lastmod>2026-04-30T22:08:23.705Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-hits-sap-packages-with-mini-shai-hulud-attack-58cc35</loc>
    <lastmod>2026-04-30T22:08:15.096Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-defenders-become-the-attackers-two-u-s-cybersecurity-pros-sentenced-in--299ab5</loc>
    <lastmod>2026-04-30T22:07:59.015Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-defenders-become-the-attackers-two-u-s-cybersecurity-pros-sentenced-in--a4b2e6</loc>
    <lastmod>2026-04-30T22:07:49.091Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-s-authentication-bypass-bug-is-being-exploited-in-the-wild-cisa-warns-d25fe3</loc>
    <lastmod>2026-04-30T22:07:42.273Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-bluekit-phishing-service-includes-an-ai-assistant-40-templates-5ff4d7</loc>
    <lastmod>2026-04-30T20:10:05.216Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/misconfigured-server-run-by-hackers-leaks-345-000-stolen-credit-cards-5ce3b2</loc>
    <lastmod>2026-04-30T20:09:55.576Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anthropic-unveils-claude-security-to-counter-ai-powered-exploit-surge-e7b577</loc>
    <lastmod>2026-05-01T15:10:01.743Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-fuels-industrial-cybercrime-as-time-to-exploit-shrinks-to-hours-4be165</loc>
    <lastmod>2026-05-07T22:09:57.746Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-cd3cbd</loc>
    <lastmod>2026-05-01T15:09:52.318Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/liberty-mutual-insurance-has-been-claimed-a-victim-to-everest-ransomware-estimat-7cbf71</loc>
    <lastmod>2026-04-30T20:09:02.852Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/watchtowr-labs-released-a-write-up-and-detection-script-on-the-cpanel-whm-vulner-be0d4a</loc>
    <lastmod>2026-04-30T20:09:43.921Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks-f5ecda</loc>
    <lastmod>2026-05-01T15:09:13.144Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pytorch-lightning-compromised-in-pypi-supply-chain-attack-to-steal-credentials-31bd68</loc>
    <lastmod>2026-05-01T14:09:54.678Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-web-based-telegram-account-management-and-automation-panel-called-hub-is-b-9b93fe</loc>
    <lastmod>2026-05-01T14:09:39.305Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-initial-access-to-an-unnamed-united-states-based-telec-633f90</loc>
    <lastmod>2026-05-01T14:09:45.828Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-unified-malware-builder-platform-called-quimacore-v2-0-is-being-sold-as-a--2630d8</loc>
    <lastmod>2026-05-01T13:09:56.255Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zencer-a-spanish-energy-sector-company-that-helps-businesses-and-individuals-opt-da988d</loc>
    <lastmod>2026-05-01T14:09:24.849Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-8e2940</loc>
    <lastmod>2026-05-01T13:09:49.443Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-prosecutors-link-15-year-old-to-gov-mega-breach-c3e981</loc>
    <lastmod>2026-04-30T17:06:15.093Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-prosecutors-link-15-year-old-to-mega-breach-at-state-s-secure-document-ag-60a45d</loc>
    <lastmod>2026-04-30T17:06:05.839Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-full-backup-of-breachforums-hn-the-cybercrime-forum--e174cc</loc>
    <lastmod>2026-05-01T13:09:26.404Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-the-ministerio-de-educacion-ministry-of-education-of-guatemala-has-allegedly-d61ac3</loc>
    <lastmod>2026-05-01T12:09:48.657Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-commodity-remote-access-trojan-called-scorpio-hvnc-is-being-sold-as-a-subs-f76671</loc>
    <lastmod>2026-05-01T12:09:55.324Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sonicwall-urges-immediate-patching-of-firewall-vulnerabilities-6471fc</loc>
    <lastmod>2026-05-01T07:10:01.380Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-npm-packages-targeted-in-supply-chain-attack-895a14</loc>
    <lastmod>2026-05-01T11:09:27.235Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-ability-symphony-plus-engineering-fee860</loc>
    <lastmod>2026-05-01T02:10:04.798Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-system-800xa-symphony-plus-iec-61850-276da0</loc>
    <lastmod>2026-04-30T16:05:19.530Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-ability-optimax-eab714</loc>
    <lastmod>2026-04-30T16:05:28.438Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-pcm600-321117</loc>
    <lastmod>2026-04-30T16:05:38.340Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-awin-gateways-acbe0e</loc>
    <lastmod>2026-05-01T06:09:34.521Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-edgenius-management-portal-0bc023</loc>
    <lastmod>2026-05-01T06:09:43.086Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/email-threat-landscape-q1-2026-trends-and-insights-9a103c</loc>
    <lastmod>2026-05-01T07:09:52.264Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/imco-group-an-israeli-electromechanical-defense-manufacturer-that-produces-compo-8470da</loc>
    <lastmod>2026-05-01T09:09:55.719Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-new-extortion-crews-are-speedrunning-the-scattered-spider-playbook-9add0b</loc>
    <lastmod>2026-05-01T11:09:36.065Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/april-kb5083769-windows-11-update-causes-backup-software-failures-7f92c5</loc>
    <lastmod>2026-05-01T05:09:54.543Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-mor-f84acb</loc>
    <lastmod>2026-05-01T07:09:44.479Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anti-ddos-firm-heaped-attacks-on-brazilian-isps-c521ba</loc>
    <lastmod>2026-05-01T06:09:52.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-copy-fail-flaw-gives-hackers-root-on-major-distros-f30ad6</loc>
    <lastmod>2026-04-30T14:07:53.028Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credential-92e8dd</loc>
    <lastmod>2026-05-01T05:09:35.426Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/etherrat-distribution-spoofing-administrative-tools-via-github-facades-a1de0b</loc>
    <lastmod>2026-05-01T05:09:46.623Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-gemini-cli-flaw-enabled-host-code-execution-supply-chain-attacks-0d9176</loc>
    <lastmod>2026-04-30T14:07:43.911Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/everyone-s-building-ai-agents-almost-nobody-s-ready-for-what-they-do-to-identity-21d36e</loc>
    <lastmod>2026-05-01T04:10:02.202Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-and-whm-bug-exploited-as-a-zero-day-poc-now-available-8a65c6</loc>
    <lastmod>2026-04-30T12:10:04.648Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exposed-data-illustrates-the-nightmare-scenario-for-a-stalkerware-victim-41c68c</loc>
    <lastmod>2026-04-30T12:09:56.611Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-logic-flaw-in-linux-kernel-enables-system-takeover-87e300</loc>
    <lastmod>2026-04-30T12:09:21.047Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/enocean-smartserver-flaws-expose-buildings-to-remote-hacking-f9a2bb</loc>
    <lastmod>2026-04-30T12:09:01.928Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-whm-vulnerability-exploited-as-zero-day-for-months-454c55</loc>
    <lastmod>2026-04-30T12:09:12.002Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tietosuojavaltuutetun-toimisto-finland-tsv-5875-2024-2bf867</loc>
    <lastmod>2026-05-01T04:09:42.933Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fast16-malware-schneier-on-security-99fec9</loc>
    <lastmod>2026-05-01T02:09:55.874Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions-ea092c</loc>
    <lastmod>2026-05-01T02:09:40.594Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sandhills-medical-says-ransomware-breach-affects-170-000-10d636</loc>
    <lastmod>2026-04-30T10:08:17.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/opendir-http-kunden-accounts-dkb-ddns-info-https-t-co-diinzyz3pa-976eb7</loc>
    <lastmod>2026-04-30T10:08:00.900Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/low-detection-macos-malware-used-in-job-interview-themed-phishing-we-recently-ob-240487</loc>
    <lastmod>2026-05-01T01:09:54.789Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/undocumented-driver-based-browser-hijacker-reddriver-targets-chinese-speakers-an-4bf2cc</loc>
    <lastmod>2026-05-01T11:09:17.683Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-have-found-new-reddriver-similar-to-the-ones-found-by-talos-https-t-co-uazywm-088116</loc>
    <lastmod>2026-05-01T01:09:37.613Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution-189a84</loc>
    <lastmod>2026-05-01T01:09:28.750Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/9-year-old-linux-kernel-vulnerability-copy-fail-enables-full-root-access-4633f2</loc>
    <lastmod>2026-04-30T08:05:41.995Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silver-fox-uses-the-new-abcdoor-backdoor-to-target-organizations-in-russia-and-i-c9f03b</loc>
    <lastmod>2026-05-01T09:09:23.940Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/no-action-taken-against-pimeyes-noyb-lawsuit-against-hamburg-dpa-7b8c34</loc>
    <lastmod>2026-04-30T08:08:31.041Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/can-ai-attack-the-cloud-lessons-from-building-an-autonomous-cloud-offensive-mult-07fd8d</loc>
    <lastmod>2026-04-30T02:07:21.036Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/autonomous-ai-is-a-force-multiplier-for-cloud-misconfiguration-exploitation-our--2fa4ab</loc>
    <lastmod>2026-05-01T00:10:01.627Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aur0ra-ransomware-names-its-first-seven-victims-http-u6lieui2dakbctcjea2bz4r4q32-383377</loc>
    <lastmod>2026-05-01T00:09:54.638Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-tested-palo-alto-globalprotect-vpn-credentials-for-5-c-156089</loc>
    <lastmod>2026-05-01T00:09:38.207Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hostoo-brazil-a-brazilian-shared-hosting-and-cpanel-whm-provider-has-allegedly-b-97192b</loc>
    <lastmod>2026-05-01T00:09:46.773Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/popular-wordpress-redirect-plugin-hid-dormant-backdoor-for-years-a40290</loc>
    <lastmod>2026-04-30T00:06:22.886Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/official-sap-npm-packages-compromised-to-steal-credentials-f2d751</loc>
    <lastmod>2026-04-30T01:06:12.747Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-april-30th-2026-f5f1d6</loc>
    <lastmod>2026-04-30T01:05:41.308Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/reverse-engineering-with-ai-unearths-high-severity-github-bug-bb518f</loc>
    <lastmod>2026-04-29T22:08:03.894Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-rce-flaws-in-qinglong-task-scheduler-for-cryptomining-1e6dc6</loc>
    <lastmod>2026-04-30T23:09:59.662Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/smsa-express-a-saudi-arabian-logistics-and-shipping-company-providing-domestic-a-b566a3</loc>
    <lastmod>2026-04-30T23:09:49.875Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cursor-ai-agent-wipes-pocketos-database-and-backups-in-9-seconds-69226f</loc>
    <lastmod>2026-04-29T22:08:13.640Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-money-mule-solution-what-every-scam-has-in-common-404cd2</loc>
    <lastmod>2026-04-29T21:08:05.082Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-finds-38-security-flaws-in-electronic-health-record-platform-b77c1e</loc>
    <lastmod>2026-04-29T20:08:19.580Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-arrested-for-hijacking-and-selling-610-000-roblox-accounts-309b04</loc>
    <lastmod>2026-04-29T20:05:39.768Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-732-bytes-to-root-on-every-major-linux-distributions-xint-daedc6</loc>
    <lastmod>2026-04-30T21:09:51.915Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-732-bytes-to-root-c7b005</loc>
    <lastmod>2026-04-30T21:09:42.064Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-cve-2026-31431-is-a-linux-privilege-escalation-bug-that-lets-any-local-78b12c</loc>
    <lastmod>2026-04-30T19:10:00.255Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-31431-a-k-a-copyfail-gt-linux-lpe-gt-description-sounds-like-ai-slop-gt-ca1444</loc>
    <lastmod>2026-04-30T21:09:31.539Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/on-2026-04-02-a-threat-actor-contacted-digicert-s-support-team-via-a-customer-ch-7023aa</loc>
    <lastmod>2026-04-30T21:09:16.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-domain-suspension-service-and-a-methodology-kit-on-a-9e2140</loc>
    <lastmod>2026-04-30T19:09:53.475Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-previously-unpatched-cpanel-information-disclosure-v-035472</loc>
    <lastmod>2026-04-30T18:10:00.879Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-russian-speaking-threat-actor-group-is-recruiting-an-initial-access-broker-iab-2b4c69</loc>
    <lastmod>2026-04-30T19:09:36.937Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/offshore-lc-bulletproof-infrastructure-6e989c</loc>
    <lastmod>2026-04-29T18:06:06.792Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aman-resorts-and-vimeo-have-been-leaked-by-shinyhunters-https-t-co-gofik0bljs-b737d9</loc>
    <lastmod>2026-04-30T17:10:01.522Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-ezcloud-https-t-co-dz59nwzsrs-the-first-vietnamese-company-to-provide-hotel--299cb0</loc>
    <lastmod>2026-04-30T18:09:36.426Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/most-teams-patch-by-severity-but-low-risk-bugs-can-become-high-impact-when-chain-4bc757</loc>
    <lastmod>2026-04-30T18:09:43.995Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack-14d346</loc>
    <lastmod>2026-04-30T15:09:58.926Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ai-powered-bluekit-phishing-kit-targets-major-platforms-with-mfa-bypass-atta-be1d5b</loc>
    <lastmod>2026-04-30T13:09:30.913Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/polymarket-rejects-data-breach-claims-as-hacker-alleges-300k-records-stolen-b08d72</loc>
    <lastmod>2026-04-29T18:05:35.694Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-0056113-selling-compromised-law-enforcement-emails-and-edr-as-a-ser-bf646c</loc>
    <lastmod>2026-04-30T10:09:55.097Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-0056113-selling-compromised-law-enforcement-emails-and-edr-as-a-ser-d348f7</loc>
    <lastmod>2026-04-30T06:09:52.931Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-3120d8</loc>
    <lastmod>2026-04-30T13:10:05.558Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202404507-8e4e0a</loc>
    <lastmod>2026-04-30T14:09:57.886Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-6bd079</loc>
    <lastmod>2026-04-30T15:09:35.817Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-whm-emergency-update-fixes-critical-auth-bypass-bug-6e0e18</loc>
    <lastmod>2026-04-29T16:09:27.682Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats-b4eb38</loc>
    <lastmod>2026-04-30T17:09:43.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/preparafaculdade-a-large-brazilian-educational-platform-used-for-pre-vestibular--2313de</loc>
    <lastmod>2026-04-30T11:09:55.589Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/movilnet-venezuela-s-state-owned-mobile-telecommunications-operator-has-allegedl-150f3a</loc>
    <lastmod>2026-04-30T13:09:12.664Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/puerto-inteligente-seguro-pis-a-mexican-government-program-under-the-administrac-eb52ee</loc>
    <lastmod>2026-04-30T11:09:36.751Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/your-yaml-files-hold-more-credentials-than-most-production-servers-the-ghostacti-12a3e6</loc>
    <lastmod>2026-04-30T13:09:20.850Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vect-2-0-ransomware-acts-as-wiper-thanks-to-design-error-16dbc7</loc>
    <lastmod>2026-04-29T16:08:09.793Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/learning-from-the-vercel-breach-shadow-ai-oauth-sprawl-300bcf</loc>
    <lastmod>2026-04-29T14:08:13.648Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/github-fixes-rce-flaw-that-gave-access-to-millions-of-private-repos-abec34</loc>
    <lastmod>2026-04-29T14:08:22.212Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fresh-litellm-vulnerability-exploited-shortly-after-disclosure-e01841</loc>
    <lastmod>2026-04-29T14:05:37.217Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hundreds-of-internet-facing-vnc-servers-expose-ics-ot-fa3bc3</loc>
    <lastmod>2026-04-29T14:05:48.672Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lotus-wiper-attack-targets-venezuelan-energy-firms-utilities-097154</loc>
    <lastmod>2026-04-30T10:09:39.225Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apd-gba-belgium-86-2026-167f7e</loc>
    <lastmod>2026-04-30T09:10:04.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day-7ba972</loc>
    <lastmod>2026-04-29T12:07:36.025Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-authentication-vulnerability-identified-update-your-server-immed-75d6fd</loc>
    <lastmod>2026-04-30T06:10:00.554Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-estonian-suspect-arrested-over-alleged-scattered-spider-cyberattacks-a0cbac</loc>
    <lastmod>2026-04-29T12:07:14.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-confirms-data-stolen-in-supply-chain-attack-4ce563</loc>
    <lastmod>2026-04-29T12:06:50.133Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-cyber-group-handala-targets-us-troops-in-bahrain-0bfba7</loc>
    <lastmod>2026-04-29T17:06:36.387Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/that-ps-code-will-get-the-txt-dns-record-of-sagi-chatcamic-com-write-the-content-c80dde</loc>
    <lastmod>2026-04-29T12:06:32.566Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-the-txt-dns-record-of-sagiw-chatcamic-com-there-is-some-ps-code-1-2-https-t-c-e5e849</loc>
    <lastmod>2026-04-29T12:06:39.891Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kb-c2-panel-http-185-102-115-84-4000-login-https-t-co-4yauh4gli3-c2abb9</loc>
    <lastmod>2026-04-29T11:05:19.089Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ce-482872-d12d45</loc>
    <lastmod>2026-04-29T10:06:24.473Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cnil-france-san-2025-014-970bb2</loc>
    <lastmod>2026-04-29T10:06:39.768Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-e7a4ad</loc>
    <lastmod>2026-04-30T05:10:03.944Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev-e9674f</loc>
    <lastmod>2026-04-30T11:09:28.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cursor-ai-ide-vulnerability-allows-code-execution-via-hidden-git-hooks-ff9e1d</loc>
    <lastmod>2026-04-29T10:06:59.691Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/38-vulnerabilities-found-in-openemr-medical-software-916120</loc>
    <lastmod>2026-04-29T10:05:35.506Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chrome-147-firefox-150-security-updates-rolling-out-36975d</loc>
    <lastmod>2026-04-29T11:05:55.187Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-github-vulnerability-exposed-millions-of-repositories-20116a</loc>
    <lastmod>2026-04-30T01:09:53.400Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-33c3be</loc>
    <lastmod>2026-04-30T02:09:52.560Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-5347a7</loc>
    <lastmod>2026-04-30T01:10:03.382Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure-224f62</loc>
    <lastmod>2026-04-30T01:09:45.030Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/april-27th-what-happened-with-our-feature-flag-configuration-the-clickup-blog-39ffd9</loc>
    <lastmod>2026-04-29T22:09:46.204Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-just-released-a-critical-security-vulnerability-notification-what-critica-a56464</loc>
    <lastmod>2026-04-29T00:09:12.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-dhl-phishing-scam-uses-11-step-attack-chain-to-steal-passwords-f6ad2c</loc>
    <lastmod>2026-04-28T22:09:33.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bluenoroff-uses-fake-zoom-calls-to-turn-victims-into-attack-lures-17150b</loc>
    <lastmod>2026-04-28T22:09:23.681Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/feuding-ransomware-groups-leak-each-other-s-data-b36319</loc>
    <lastmod>2026-04-29T22:09:37.625Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/broken-vect-2-0-ransomware-acts-as-a-data-wiper-for-large-files-d17f5e</loc>
    <lastmod>2026-04-28T22:08:50.124Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw-4d2f99</loc>
    <lastmod>2026-04-28T22:09:06.733Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-spm-cdn-assets-dist-2026-s3-us-east-2-amazonaws-com-bootstrap-sh-system-pe-574559</loc>
    <lastmod>2026-04-28T21:08:28.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/creedx-monstergateway-a-brazilian-white-label-payment-gateway-supporting-pix-bol-207716</loc>
    <lastmod>2026-04-29T20:09:46.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/video-service-vimeo-confirms-anodot-breach-exposed-user-data-a6b007</loc>
    <lastmod>2026-04-28T20:08:15.635Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-sing-00d19a</loc>
    <lastmod>2026-04-29T19:09:53.723Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyber-insurance-data-gives-cisos-new-ammo-for-budget-talks-f4b3ac</loc>
    <lastmod>2026-04-29T19:09:44.712Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-095e4c</loc>
    <lastmod>2026-04-29T19:09:34.889Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vidar-rises-to-top-of-chaotic-infostealer-market-1a5291</loc>
    <lastmod>2026-04-28T20:07:50.362Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/realt-https-t-co-ub9prc2hmx-a-fintech-and-crypto-platform-for-investing-in-real--336725</loc>
    <lastmod>2026-04-29T13:09:59.937Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campa-21b0d4</loc>
    <lastmod>2026-04-29T13:09:53.354Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pack2theroot-12-year-old-linux-packagekit-flaw-enables-full-compromise-846402</loc>
    <lastmod>2026-04-29T13:09:43.313Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vimeo-confirms-user-and-customer-data-breach-6e3f4b</loc>
    <lastmod>2026-04-28T18:05:17.031Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-new-infostealer-called-yellow-stealer-is-being-sold-on-a-popular-cybercrim-8def46</loc>
    <lastmod>2026-04-29T08:09:57.120Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-renap-registro-nacional-de-las-personas-and-sat-superintendencia-de-administ-e0be6e</loc>
    <lastmod>2026-04-29T09:09:58.090Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/polymarket-the-decentralized-prediction-market-platform-has-allegedly-been-breac-3c4a61</loc>
    <lastmod>2026-04-29T08:09:47.899Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fondo-nacional-de-garantias-fga-a-colombian-credit-guarantee-fund-supporting-peo-125ac4</loc>
    <lastmod>2026-04-29T07:09:57.392Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nemea-group-a-major-french-real-estate-and-apart-hotel-operator-has-allegedly-be-eb21e7</loc>
    <lastmod>2026-04-29T08:09:35.833Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-reportedly-charges-scattered-spider-hacker-arrested-in-finland-a7664f</loc>
    <lastmod>2026-04-28T16:07:06.076Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data-b55ba1</loc>
    <lastmod>2026-04-28T16:07:17.595Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi-b9ddf1</loc>
    <lastmod>2026-04-29T07:09:50.696Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/robinhood-vulnerability-exploited-for-phishing-attacks-bae023</loc>
    <lastmod>2026-04-28T16:06:49.785Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fresh-wave-of-glassworm-vs-code-extensions-slices-through-supply-chain-53e371</loc>
    <lastmod>2026-04-28T16:06:27.993Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-civil-defense-of-amazonas-https-t-co-1cjbluzrzt-a-brazilian-state-government-db4ee7</loc>
    <lastmod>2026-04-29T07:09:32.928Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chicago-teen-19-linked-to-international-scattered-spider-hacking-ring-prosecutor-e4d12b</loc>
    <lastmod>2026-04-29T04:09:56.841Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ingressolive-a-brazilian-online-platform-and-mobile-app-for-creating-managing-an-e84d7b</loc>
    <lastmod>2026-04-29T06:10:00.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lg-berlin-2-o-202-24-326439</loc>
    <lastmod>2026-04-29T06:09:38.979Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ransom-note-did-not-follow-the-normal-lockbit-format-directing-victims-to-a--303e69</loc>
    <lastmod>2026-04-29T05:09:47.636Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/detection-insight-suspicious-accdr-dropper-activity-possible-bitter-tradecraft-a-409907</loc>
    <lastmod>2026-04-29T05:09:40.583Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cnil-france-san-2025-011-c6e23c</loc>
    <lastmod>2026-04-28T14:09:22.735Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vg-wiesbaden-6-k-996-22-wi-873c96</loc>
    <lastmod>2026-04-28T14:09:38.968Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-an-opsec-playbook-how-threat-actors-evade-detection-2bdf91</loc>
    <lastmod>2026-04-28T14:09:14.030Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about-a7d146</loc>
    <lastmod>2026-04-29T05:09:32.059Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-chinese-state-hacker-extradited-to-us-6141ed</loc>
    <lastmod>2026-04-28T14:08:07.576Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dozens-of-open-vsx-extension-clones-linked-to-glassworm-malware-6d3281</loc>
    <lastmod>2026-04-28T14:08:18.010Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/after-mythos-new-playbooks-for-a-zero-window-era-7bce9c</loc>
    <lastmod>2026-04-29T04:09:50.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-unauthenticated-rce-9f92ed</loc>
    <lastmod>2026-04-29T04:09:41.640Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-firestarter-backdoor-targets-cisco-firepower-devices-e1a491</loc>
    <lastmod>2026-04-28T12:08:23.911Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/electric-motorcycles-and-scooters-face-hacking-risks-to-security-and-rider-safet-ca4588</loc>
    <lastmod>2026-04-28T12:05:41.041Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/no-patch-for-new-phantomrpc-privilege-escalation-technique-in-windows-b92c73</loc>
    <lastmod>2026-04-28T12:05:52.577Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/germany-suspects-russia-is-behind-signal-phishing-that-targeted-top-officials-fcc25d</loc>
    <lastmod>2026-04-28T12:08:13.147Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/also-related-fake-captcha-page-https-screenly-cam-command-cmd-c-curl-sko-temp-ms-60c8e4</loc>
    <lastmod>2026-04-28T11:08:10.371Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-efafeb</loc>
    <lastmod>2026-04-28T10:07:07.498Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-silk-typhoon-hacker-extradited-to-u-s-over-covid-research-cyberattacks-c3fa25</loc>
    <lastmod>2026-04-29T01:10:02.972Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover-d827c4</loc>
    <lastmod>2026-04-28T23:10:02.291Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202-6db151</loc>
    <lastmod>2026-04-29T00:09:53.807Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/medtronic-hack-confirmed-after-shinyhunters-threatens-data-leak-0be119</loc>
    <lastmod>2026-04-28T23:09:50.990Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-4bde14</loc>
    <lastmod>2026-04-28T23:09:43.253Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vimeo-claimed-by-shinyhunters-https-t-co-boe4qz3w6z-bea412</loc>
    <lastmod>2026-04-28T08:08:35.263Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-national-extradited-to-us-for-pandemic-era-silk-typhoon-attacks-e500d4</loc>
    <lastmod>2026-04-28T08:08:28.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/robinhood-account-creation-flaw-abused-to-send-phishing-emails-75879c</loc>
    <lastmod>2026-04-28T09:09:38.013Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-smtp-and-aws-ses-accounts-on-a-popular-cyber-7d1b01</loc>
    <lastmod>2026-04-28T09:09:23.720Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-active-directory-dumper-amp-vpn-checker-v2-0-263a81</loc>
    <lastmod>2026-04-28T09:08:50.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-combines-social-engineering-malware-cloud-abuse-ae61f5</loc>
    <lastmod>2026-04-28T18:10:03.579Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-april-27th-2026-42c87f</loc>
    <lastmod>2026-04-28T08:09:53.677Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-full-backup-of-an-unnamed-crypto-b2b-affil-5ecc90</loc>
    <lastmod>2026-04-28T08:09:20.250Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/glassworm-malware-attacks-return-via-73-openvsx-sleeper-extensions-91d477</loc>
    <lastmod>2026-04-28T07:09:04.845Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canada-arrests-three-for-operating-sms-blaster-device-in-toronto-ab2782</loc>
    <lastmod>2026-04-28T07:09:31.604Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-react2shell-exploitation-toolkit-on-a-popu-82ad47</loc>
    <lastmod>2026-04-28T18:09:42.183Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/82-chrome-extensions-found-selling-user-data-6-5-million-users-affected-58b095</loc>
    <lastmod>2026-04-28T07:08:26.476Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-9870014-261cad</loc>
    <lastmod>2026-04-28T07:08:08.208Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-silk-typhoon-hacker-extradited-to-us-for-cyberespionage-c088a7</loc>
    <lastmod>2026-04-28T06:09:46.943Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/how-big-a-threat-are-iranian-backed-cyberattacks-bedd3e</loc>
    <lastmod>2026-04-28T06:09:32.831Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/totalenergies-a-major-french-energy-company-that-produces-and-sells-oil-gas-and--2d7542</loc>
    <lastmod>2026-04-28T17:09:57.796Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-university-of-san-carlos-of-guatemala-usac-has-allegedly-been-breached-with--932dc9</loc>
    <lastmod>2026-04-28T17:09:37.569Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-leaks-data-of-udemy-zara-7-eleven-in-salesforce-linked-breach-5246ab</loc>
    <lastmod>2026-04-28T05:09:48.776Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/senators-seek-answers-about-hackers-obtaining-sensitive-student-data-from-ostens-8e20f9</loc>
    <lastmod>2026-04-28T05:09:17.007Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lcbo-liquor-control-board-of-ontario-database-breached-165-840-customer-records--78be1a</loc>
    <lastmod>2026-04-28T05:08:30.536Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/den-kulturelle-skolesekken-dks-database-breached-1-389-534-records-exposed-from--519a7d</loc>
    <lastmod>2026-04-28T05:07:08.390Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/choice-health-insurance-has-allegedly-been-breached-with-2-1-million-client-and--7a0631</loc>
    <lastmod>2026-04-28T05:06:13.176Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pypi-package-with-1-1m-monthly-downloads-hacked-to-push-infostealer-f80278</loc>
    <lastmod>2026-04-28T05:05:33.205Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/home-security-giant-adt-data-breach-affects-5-5-million-people-c0b3e2</loc>
    <lastmod>2026-04-28T05:05:43.639Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-atta-4d29a9</loc>
    <lastmod>2026-04-28T15:09:51.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unpatched-phantomrpc-flaw-in-windows-enables-privilege-escalation-6dc09b</loc>
    <lastmod>2026-04-28T05:05:23.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-4acad8</loc>
    <lastmod>2026-04-28T15:09:42.466Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-controls-90-of-rare-earth-processing-state-sponsored-cyber-operations-targ-05125c</loc>
    <lastmod>2026-04-28T09:09:44.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/blackfile-actively-extorting-data-theft-victims-in-retail-and-hospitality-sector-1ab0ec</loc>
    <lastmod>2026-04-28T08:08:09.047Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ctt-correios-de-portugal-portugal-s-national-postal-carrier-has-allegedly-been-b-bddd04</loc>
    <lastmod>2026-04-28T07:07:52.953Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ministerio-de-trabajo-y-prevision-social-ministry-of-labor-and-social-welfar-7a5127</loc>
    <lastmod>2026-04-28T07:09:20.643Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/medtronic-confirms-breach-after-hackers-claim-9-million-records-theft-8158e2</loc>
    <lastmod>2026-04-28T06:07:45.719Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/money-launderer-linked-to-230m-crypto-heist-gets-70-months-in-prison-e9d4dc</loc>
    <lastmod>2026-04-28T06:08:08.554Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/deepfake-voice-attacks-are-outpacing-defenses-what-security-leaders-should-know-bbf926</loc>
    <lastmod>2026-04-28T06:08:30.542Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mythos-changed-the-math-on-vulnerability-discovery-most-teams-aren-t-ready-for-t-070e48</loc>
    <lastmod>2026-04-28T13:09:59.359Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware-b8b132</loc>
    <lastmod>2026-04-29T18:10:00.623Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-hackers-exploit-microsoft-teams-to-deploy-snow-malware-60cc8b</loc>
    <lastmod>2026-04-28T06:07:37.398Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/incomplete-windows-patch-opens-door-to-zero-click-attacks-f4ab17</loc>
    <lastmod>2026-04-28T06:06:43.345Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/openssh-flaw-allowing-full-root-shell-access-lurked-for-15-years-fe82d7</loc>
    <lastmod>2026-04-28T06:06:51.402Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/malicious-ai-prompt-injection-attacks-increasing-but-sophistication-still-low-go-76015e</loc>
    <lastmod>2026-04-28T06:07:12.791Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/20-year-old-malware-rewrites-history-of-cyber-sabotage-aff86e</loc>
    <lastmod>2026-04-28T05:10:04.277Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202404507-4e20da</loc>
    <lastmod>2026-04-28T13:09:41.843Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-uses-email-bombing-social-engineering-to-deploy-snow-malware-300e4e</loc>
    <lastmod>2026-04-27T12:05:42.628Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/easily-exploitable-pack2theroot-linux-vulnerability-leads-to-root-access-f4aa12</loc>
    <lastmod>2026-04-27T19:05:27.959Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vidar-infostealer-spreads-via-fake-captchas-hides-in-jpeg-and-txt-files-456159</loc>
    <lastmod>2026-04-27T12:07:07.553Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-launches-sweeping-crackdown-on-southeast-asia-cyberscams-and-sanctions-cambod-b29920</loc>
    <lastmod>2026-04-27T10:09:51.655Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firefox-vulnerability-allows-tor-user-fingerprinting-946dff</loc>
    <lastmod>2026-04-27T10:10:01.275Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud-ab6cca</loc>
    <lastmod>2026-04-27T10:09:36.986Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/adt-and-udemy-salesforce-data-dumped-by-shinyhunters-https-t-co-poeoircxvy-574c8e</loc>
    <lastmod>2026-04-26T21:06:43.195Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-entra-agent-id-flaw-enabled-tenant-takeover-via-privilege-escalation-59504e</loc>
    <lastmod>2026-04-26T20:06:33.568Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gruppo-cap-cap-holding-s-p-a-the-water-and-wastewater-management-company-serving-194d8a</loc>
    <lastmod>2026-04-26T19:06:47.428Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-aspx-webshell-access-with-network-admin-priv-1c949b</loc>
    <lastmod>2026-04-26T19:06:54.337Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-phishing-as-a-service-platform-called-blue-751b31</loc>
    <lastmod>2026-04-26T18:05:36.704Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-pdf-exploit-builder-advertised-as-100-fud--5f327a</loc>
    <lastmod>2026-04-26T18:06:19.947Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/get-covered-a-u-s-based-renters-insurance-platform-has-allegedly-been-breached-w-cf591f</loc>
    <lastmod>2026-04-26T18:06:35.641Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-rxtlgfcnqi-a-french-short-term-rental-property-booking-platform-has-a-7e0677</loc>
    <lastmod>2026-04-26T17:05:42.136Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/american-utility-firm-itron-discloses-breach-of-internal-it-network-4279be</loc>
    <lastmod>2026-04-26T16:05:55.391Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-j2okvkqv43-grupo-abril-the-brazilian-media-group-responsible-for-site-e45aa9</loc>
    <lastmod>2026-04-26T16:05:14.222Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hospital-brisas-a-panama-based-hospital-founded-in-2018-has-allegedly-been-breac-bb3cfe</loc>
    <lastmod>2026-04-26T16:05:28.534Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-offering-government-and-police-email-access-for-emer-ee47b9</loc>
    <lastmod>2026-04-26T16:10:02.332Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lapsus-group-claims-3-victims-mapfre-vodafone-checkmarx-https-t-co-2c2swqzmvu-c1cc1e</loc>
    <lastmod>2026-04-26T00:08:20.493Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/litecoin-has-confirmed-a-zero-day-bug-caused-a-dos-attack-that-disrupted-major-m-b4cc9c</loc>
    <lastmod>2026-04-25T22:08:05.174Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-3tb-iranian-military-database-tied-to-ogha-82ab39</loc>
    <lastmod>2026-04-25T21:08:16.502Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/agelessrx-a-u-s-based-telehealth-platform-focused-on-longevity-and-anti-aging-me-56f326</loc>
    <lastmod>2026-04-25T21:08:23.961Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-simplex29-is-selling-an-alleged-data-br-6387a8</loc>
    <lastmod>2026-04-25T19:07:42.830Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/banco-falabella-s-debt-collection-service-falabella-cobranza-iserra-bogota-and-m-e85814</loc>
    <lastmod>2026-04-25T19:08:19.949Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/salama-islamic-arab-insurance-company-https-t-co-spvle6t26s-one-of-the-uae-s-lar-31b461</loc>
    <lastmod>2026-04-25T18:08:01.474Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bell-canada-https-t-co-jkcv0yzqyw-bell-mobility-one-of-canada-s-three-largest-te-744755</loc>
    <lastmod>2026-04-25T17:09:34.549Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-critical-insecure-direct-object-reference-idor-vulne-60a9fd</loc>
    <lastmod>2026-04-25T16:08:27.441Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware-f35dcb</loc>
    <lastmod>2026-04-25T16:08:13.923Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-captcha-scam-abuses-verification-clicks-to-send-costly-international-texts-ffb12f</loc>
    <lastmod>2026-04-25T12:08:03.100Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-linked-apt-gopherwhisper-abuses-legitimate-services-in-government-attacks-5ec0c3</loc>
    <lastmod>2026-04-30T09:07:42.403Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/discord-sleuths-gained-unauthorized-access-to-anthropic-s-mythos-db6811</loc>
    <lastmod>2026-04-25T12:07:45.793Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software-c6e97f</loc>
    <lastmod>2026-04-25T11:09:19.770Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline-ff0558</loc>
    <lastmod>2026-05-11T13:08:31.073Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/adt-confirms-data-breach-after-shinyhunters-leak-threat-fc93e0</loc>
    <lastmod>2026-04-25T00:06:40.961Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-npm-threat-landscape-attack-surface-and-mitigations-b626a9</loc>
    <lastmod>2026-04-25T00:06:30.952Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shai-hulud-changed-npm-supply-chain-attacks-adversaries-now-use-wormable-propaga-08ffee</loc>
    <lastmod>2026-04-24T23:06:54.203Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-vmoreal-is-actively-seeking-new-suppliers-of-corporate-network-acce-05990c</loc>
    <lastmod>2026-04-24T23:06:20.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-clickfix-attack-hides-in-native-windows-tools-to-reduce-detection-risk-78bb0f</loc>
    <lastmod>2026-04-24T22:05:48.607Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firestarter-malware-survives-cisco-firewall-updates-security-patches-678451</loc>
    <lastmod>2026-04-25T18:10:04.230Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cracks-in-the-bedrock-agent-god-mode-eeca0a</loc>
    <lastmod>2026-04-24T22:05:23.877Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/our-research-reveals-agent-god-mode-in-amazon-bedrock-agentcore-overly-broad-iam-731c51</loc>
    <lastmod>2026-04-24T22:05:14.699Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-on-a-cybercrime-forum-is-advertising-a-mobile-malware-toolkit-tar-2ee7c6</loc>
    <lastmod>2026-04-24T21:05:12.945Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april-2341f7</loc>
    <lastmod>2026-04-24T20:08:03.006Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-blackfile-extortion-group-linked-to-surge-of-vishing-attacks-2c44dc</loc>
    <lastmod>2026-04-24T23:08:26.761Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-universidad-peruana-de-ciencias-aplicadas-upc-one-of-peru-s-largest-private--fdb9a5</loc>
    <lastmod>2026-04-24T19:06:39.281Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/v2-of-the-kali365-phaas-toolkit-has-emerged-with-dedicated-oauth-and-ai-based-lu-85ebc7</loc>
    <lastmod>2026-04-24T19:06:45.923Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-pack2theroot-flaw-gives-hackers-root-linux-access-7557c2</loc>
    <lastmod>2026-04-24T18:09:28.687Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patche-4ad217</loc>
    <lastmod>2026-05-04T10:08:43.607Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-e8a5ef</loc>
    <lastmod>2026-04-25T15:09:46.409Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-32223-windows-usb-printing-stack-usbprint-sys-elevation-of-privilege-vu-c9eac7</loc>
    <lastmod>2026-04-24T18:08:04.085Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/four-vulnerabilities-have-been-added-to-the-cisa-kev-catalog-cve-2025-29635-d-li-4d8051</loc>
    <lastmod>2026-04-25T15:09:46.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/here-s-what-we-found-this-wasn-t-built-to-steal-files-or-lock-screens-it-was-bui-21c4ba</loc>
    <lastmod>2026-04-24T18:07:49.438Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-history-of-cyberwar-just-got-rewritten-labssentinel-has-discovered-fast16-a--396c4a</loc>
    <lastmod>2026-04-24T18:07:57.740Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/emerging-enterprise-security-risks-of-ai-c33e7b</loc>
    <lastmod>2026-04-24T19:09:45.171Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dora-and-operational-resilience-credential-management-as-a-financial-risk-contro-151bd3</loc>
    <lastmod>2026-04-24T17:09:59.479Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/le-petit-vapoteur-https-t-co-hb7uiyvmo0-one-of-france-s-biggest-online-vape-reta-018be5</loc>
    <lastmod>2026-04-24T17:09:50.284Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-private-telegram-group-chat-of-shinyhunters-one-of-the-most-prolific-cybercr-f7fb8c</loc>
    <lastmod>2026-04-24T17:09:18.971Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-novav1-is-selling-an-android-spyware-pr-227899</loc>
    <lastmod>2026-04-24T17:09:34.165Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-s-defense-software-7a6551</loc>
    <lastmod>2026-04-24T16:09:23.958Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pre-stuxnet-sabotage-malware-fast16-linked-to-us-iran-cyber-tensions-2dd0d0</loc>
    <lastmod>2026-04-24T16:07:42.129Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-unauthorized-mythos-access-plankey-cisa-nomination-ends-new-displa-ba501b</loc>
    <lastmod>2026-04-24T16:07:52.773Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-malware-binder-tool-branded-universal-file-binder-2026-is-being-sold-on-a-popu-d4d1a8</loc>
    <lastmod>2026-04-24T15:08:10.682Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-known-as-seacoat-has-made-available-an-alleged-dataset-dump-from--14b351</loc>
    <lastmod>2026-04-24T15:08:33.796Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-10-000-zimbra-servers-vulnerable-to-ongoing-xss-attacks-d3c059</loc>
    <lastmod>2026-04-25T06:09:19.395Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korea-s-lazarus-targets-macos-users-via-clickfix-c61d15</loc>
    <lastmod>2026-04-24T14:09:11.400Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-hijacks-bitwarden-cli-uses-dependabot-to-deploy-shai-hulud-malware-76936e</loc>
    <lastmod>2026-04-24T15:09:24.772Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-scanner-relies-on-an-acquirer-file-containing-targets-and-a-lease-file-defin-468022</loc>
    <lastmod>2026-04-24T13:08:10.673Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-police-arrest-hexdex-hacker-over-mass-data-theft-and-leaks-49ed6d</loc>
    <lastmod>2026-04-24T12:05:35.818Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-federal-agency-s-cisco-firewall-infected-with-firestarter-backdoor-4eeb79</loc>
    <lastmod>2026-04-24T12:05:18.405Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases-848534</loc>
    <lastmod>2026-04-25T03:09:27.042Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/phantomrpc-a-new-privilege-escalation-technique-in-windows-rpc-00d762</loc>
    <lastmod>2026-04-24T11:09:47.506Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2-8ccdf0</loc>
    <lastmod>2026-04-25T05:09:06.488Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure-a7af71</loc>
    <lastmod>2026-04-25T21:09:43.723Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerabilities-patched-in-crowdstrike-tenable-products-ed9a44</loc>
    <lastmod>2026-04-24T10:09:34.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-npm-package-hit-in-supply-chain-attack-bf90ac</loc>
    <lastmod>2026-04-24T10:09:45.536Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tropic-trooper-apt-takes-aim-at-home-routers-japanese-targets-321bb5</loc>
    <lastmod>2026-04-24T02:08:23.726Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-attack-fallout-expands-to-more-customers-and-third-party-systems-b421e7</loc>
    <lastmod>2026-04-24T00:08:16.938Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-threats-in-the-wild-the-current-state-of-prompt-injections-on-the-web-649e6c</loc>
    <lastmod>2026-04-24T00:08:41.784Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/newly-deciphered-sabotage-malware-may-have-targeted-iran-s-nuclear-program-and-p-a057e6</loc>
    <lastmod>2026-04-24T00:08:33.228Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-backed-hackers-are-industrializing-botnets-2aa7ec</loc>
    <lastmod>2026-04-24T00:08:22.958Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-history-of-cyberwar-just-got-rewritten-with-a-new-labssentinel-discovery-by--15ea2a</loc>
    <lastmod>2026-04-23T23:07:33.907Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin-d7312d</loc>
    <lastmod>2026-04-23T22:05:27.567Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-uk-agencies-warn-hackers-were-hiding-on-cisco-firewalls-long-after-patches-we-64719d</loc>
    <lastmod>2026-04-23T22:05:19.444Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-fbi-the-uk-s-ncsc-and-international-partners-have-issued-a-joint-advisory-al-95b57f</loc>
    <lastmod>2026-04-24T07:10:06.082Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware-e2acd5</loc>
    <lastmod>2026-04-24T11:09:57.469Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dragos-despite-ai-use-new-malware-targeting-water-plants-is-hype-594a4a</loc>
    <lastmod>2026-04-24T07:09:37.864Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-t-e25d2b</loc>
    <lastmod>2026-04-24T07:09:46.779Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-a3bc27</loc>
    <lastmod>2026-04-24T06:09:50.318Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-dataset-allegedly-obtained-from-bodyhit-club-https-t-e15186</loc>
    <lastmod>2026-04-24T05:09:58.040Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-known-as-kim1000p-is-selling-an-alleged-dataset-containing-80-mil-a6e50b</loc>
    <lastmod>2026-04-24T05:10:04.516Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data-5d8217</loc>
    <lastmod>2026-04-24T04:10:03.330Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials-2d962f</loc>
    <lastmod>2026-04-24T06:09:30.728Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/redirect-to-https-www-cisa-gov-news-events-directives-v1-ed-25-03-identify-and-m-41c7cf</loc>
    <lastmod>2026-04-24T04:09:45.469Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nsa-joins-the-ncsc-and-others-in-releasing-joint-guidance-detailing-multiple-chi-bf9121</loc>
    <lastmod>2026-04-24T03:09:42.062Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-2021-atraf-breach-one-of-the-most-harmful-data-leaks-in-israel-s-history-is--15c220</loc>
    <lastmod>2026-04-24T03:10:00.208Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/day-9-ransomware-deployment-the-threat-actor-rdp-d-from-the-beachhead-to-backup--e885bd</loc>
    <lastmod>2026-04-24T04:09:39.336Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-statement-on-checkmarx-supply-chain-incident-the-bitwarden-security-te-d45c68</loc>
    <lastmod>2026-04-24T03:09:49.634Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-ve-updated-emergency-directive-25-03-in-response-to-cyber-threat-actors-using-9dfae1</loc>
    <lastmod>2026-04-24T04:09:31.772Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/harvester-apt-expands-spying-operations-with-new-gogra-linux-malware-7cfbbf</loc>
    <lastmod>2026-04-24T03:09:34.089Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dozen-allied-agencies-say-china-is-building-covert-hacker-networks-out-of-ever-e0c5a0</loc>
    <lastmod>2026-04-24T03:09:19.673Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/carlson-software-vasco-b-gnss-receiver-5060be</loc>
    <lastmod>2026-04-23T23:09:42.469Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hangzhou-xiongmai-technology-co-ltd-xm530-ip-camera-de06d4</loc>
    <lastmod>2026-04-23T23:09:51.562Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yadea-t5-electric-bicycle-006343</loc>
    <lastmod>2026-04-23T23:09:58.970Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/milesight-cameras-f82c59</loc>
    <lastmod>2026-04-24T01:09:56.776Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/intrado-911-emergency-gateway-egw-5b5d42</loc>
    <lastmod>2026-04-24T01:10:05.296Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/spicejet-online-booking-system-4a7777</loc>
    <lastmod>2026-04-24T02:10:03.846Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/arkansas-state-crime-lab-database-breached-threat-actor-kittykatkrew-leaks-court-d3d165</loc>
    <lastmod>2026-04-23T23:09:34.680Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/arkansas-state-crime-lab-database-breached-threat-actor-kittykatkrew-leaks-court-83c6d1</loc>
    <lastmod>2026-04-23T22:09:59.450Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool-bda927</loc>
    <lastmod>2026-04-23T22:09:52.491Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dark-web-informer-bc931e</loc>
    <lastmod>2026-04-24T11:09:10.268Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ants-agence-nationale-des-titres-securises-france-titres-the-french-government-a-40b59c</loc>
    <lastmod>2026-04-23T22:09:26.353Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/regular-password-resets-aren-t-as-safe-as-you-think-0629b2</loc>
    <lastmod>2026-04-23T22:09:12.705Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bad-memories-still-haunt-ai-agents-499e2f</loc>
    <lastmod>2026-04-23T21:09:42.715Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-apt-abuses-multiple-cloud-tools-to-spy-on-mongolia-010f90</loc>
    <lastmod>2026-04-23T21:09:36.298Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ico-uk-medialab-ai-inc-5263e7</loc>
    <lastmod>2026-04-23T18:10:04.290Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cnil-france-san-2026-002-2a247c</loc>
    <lastmod>2026-04-23T19:09:40.656Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-identified-as-mdghost-claims-to-have-compromised-a-uae-based-inve-5bf46e</loc>
    <lastmod>2026-04-23T16:09:04.411Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign-9bc390</loc>
    <lastmod>2026-04-23T16:08:50.882Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firestarter-backdoor-dd20f4</loc>
    <lastmod>2026-04-23T20:08:39.470Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/project-glasswing-proved-ai-can-find-the-bugs-who-s-going-to-fix-them-8bdf83</loc>
    <lastmod>2026-04-23T15:09:03.528Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uk-warns-of-chinese-hackers-using-proxy-networks-to-evade-detection-872ddb</loc>
    <lastmod>2026-04-23T14:08:52.802Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-gopherwhisper-apt-group-abuses-outlook-slack-discord-for-comms-cf7840</loc>
    <lastmod>2026-04-26T03:08:23.850Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-cybersecurity-firm-s-ai-hacking-claims-draw-comparisons-to-claude-mythos-433e6d</loc>
    <lastmod>2026-04-23T14:08:21.645Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/beyond-the-ai-control-surface-the-host-also-preserved-the-operator-s-alerting-an-237b42</loc>
    <lastmod>2026-04-23T13:08:48.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-bluehammer-flaw-exploited-as-zero-day-2b173a</loc>
    <lastmod>2026-04-24T08:09:52.529Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-hidden-website-instructions-in-new-attacks-on-ai-assistants-07d4d1</loc>
    <lastmod>2026-04-23T18:08:14.112Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-behavioral-shift-why-trusted-relationships-are-the-newest-attack-surface-17f4be</loc>
    <lastmod>2026-04-23T12:09:40.888Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-can-autonomously-hack-cloud-systems-with-minimal-oversight-researchers-bb49a2</loc>
    <lastmod>2026-04-23T12:09:56.872Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10167745-682a15</loc>
    <lastmod>2026-04-23T12:09:17.233Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/defending-against-china-nexus-covert-networks-of-compromised-devices-6d029c</loc>
    <lastmod>2026-04-24T08:09:50.948Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-extracts-deleted-signal-messages-from-iphone-notification-database-schneier--2e763c</loc>
    <lastmod>2026-04-24T08:09:50.774Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-extracts-deleted-signal-messages-from-iphone-notification-database-https-t-c-3d897a</loc>
    <lastmod>2026-04-23T12:08:42.258Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/defending-against-china-nexus-covert-networks-of-compromised-devices-861574</loc>
    <lastmod>2026-04-23T13:08:08.256Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zealot-shows-what-ai-s-capable-of-in-staged-cloud-attack-4bbffa</loc>
    <lastmod>2026-04-23T10:09:05.149Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/recent-microsoft-defender-vulnerability-exploited-as-zero-day-c62c27</loc>
    <lastmod>2026-04-24T08:09:50.395Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-patches-ios-flaw-allowing-recovery-of-deleted-chats-1a5371</loc>
    <lastmod>2026-04-24T08:09:50.593Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach-d330be</loc>
    <lastmod>2026-04-23T10:08:09.659Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic--cdcc7f</loc>
    <lastmod>2026-04-24T08:09:50.107Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trugreen-has-been-claimed-a-victim-to-inc-ransom-ransomware-https-t-co-brkgzeqxy-314e27</loc>
    <lastmod>2026-04-23T00:08:54.503Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/labscon25-replay-are-your-chinese-cameras-spying-for-you-or-on-you-89f783</loc>
    <lastmod>2026-04-22T23:08:48.698Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/is-your-40-doorbell-camera-a-security-asset-or-a-shadow-network-node-in-this-lab-083c64</loc>
    <lastmod>2026-04-22T23:08:40.966Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-836c62</loc>
    <lastmod>2026-04-22T22:08:32.075Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-fixes-ios-bug-that-retained-deleted-notification-data-c045e3</loc>
    <lastmod>2026-04-22T22:07:59.131Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-mirai-campaign-exploits-rce-flaw-in-eol-d-link-routers-cf26ec</loc>
    <lastmod>2026-04-23T00:08:30.767Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-or-whoever-it-is-because-everyone-knows-it-all-has-leaked-6-more-co-c9393e</loc>
    <lastmod>2026-04-22T21:07:30.699Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows-5ffe18</loc>
    <lastmod>2026-04-22T20:07:08.869Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/discord-linked-group-accessed-anthropic-s-claude-mythos-ai-in-vendor-breach-6f4a7e</loc>
    <lastmod>2026-04-22T20:06:59.931Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-identified-as-ghostbyte-is-selling-super-admin-access-to-a-colomb-d6ea9a</loc>
    <lastmod>2026-04-22T20:06:50.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain-0cd956</loc>
    <lastmod>2026-04-22T20:06:41.665Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-tools-are-helping-mediocre-north-korean-hackers-steal-millions-098267</loc>
    <lastmod>2026-04-23T01:10:06.497Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/don-t-wait-for-a-patch-mitigate-redsun-zero-day-risk-in-microsoft-defender-today-f1ed52</loc>
    <lastmod>2026-04-23T01:09:56.406Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-ashborn-is-selling-an-alleged-database--7c14c2</loc>
    <lastmod>2026-04-22T21:09:48.613Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sentinelone-s-autonomous-security-intelligence-asi-flagged-the-execution-pattern-a550d5</loc>
    <lastmod>2026-04-22T21:10:03.647Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/three-weeks-three-tier-1-supply-chain-attacks-sentinelone-stopped-all-three-from-a94198</loc>
    <lastmod>2026-04-23T01:09:35.869Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-zsenior-is-selling-a-dataset-containing-5a1f3a</loc>
    <lastmod>2026-04-22T21:09:41.330Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-cpu-z-attackers-deployed-three-separate-persistence-mechanisms-specifically--d348dc</loc>
    <lastmod>2026-04-22T21:09:56.052Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-token-69eea6</loc>
    <lastmod>2026-04-23T01:09:28.022Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zirconite-https-t-co-fbftgq0ltn-an-official-commercial-partner-and-authorized-re-a176a8</loc>
    <lastmod>2026-04-22T20:09:52.512Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-330-million-line-credit-card-compilation-labeled-cre-be9abf</loc>
    <lastmod>2026-04-22T19:10:01.959Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-caller-as-a-service-fraud-the-scam-economy-has-a-hiring-process-89e29a</loc>
    <lastmod>2026-04-22T19:09:54.066Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dprk-fake-job-scams-self-propagate-in-contagious-interview-824fa5</loc>
    <lastmod>2026-04-22T19:09:44.640Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-hype-vs-reality-is-ai-really-rewriting-the-vulnerability-equation-1eaec9</loc>
    <lastmod>2026-04-22T16:05:44.627Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-cost-of-understanding-llm-driven-reverse-engineering-vs-iterative-llm-obfusc-febdbd</loc>
    <lastmod>2026-04-22T18:09:33.234Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/llms-have-gotten-good-enough-at-reverse-engineering-to-recover-source-code-from--052d8b</loc>
    <lastmod>2026-04-22T18:09:49.672Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-mdghost-claims-to-have-gained-complete--03bbe6</loc>
    <lastmod>2026-04-22T18:09:56.916Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/whql-signed-windows-kernel-driver-that-hands-any-user-mode-caller-an-arbitrary-m-8098f3</loc>
    <lastmod>2026-04-22T19:09:15.873Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api-d04ed9</loc>
    <lastmod>2026-04-22T18:09:42.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-identified-an-exposed-server-that-provided-unusual-visibility-into-a-large-sc-43da67</loc>
    <lastmod>2026-04-22T18:09:25.536Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/valkyrie-panel-https-momentum-effects-anderson-conferencing-trycloudflare-com-lo-5330ef</loc>
    <lastmod>2026-04-22T18:09:19.357Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens-c9f4dc</loc>
    <lastmod>2026-04-22T18:09:10.671Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-wiper-malware-targeted-venezuelan-energy-sector-prior-to-us-intervention-36718b</loc>
    <lastmod>2026-04-22T15:09:25.574Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/most-serious-cyberattacks-against-the-uk-now-from-russia-iran-and-china-cyber-ch-481684</loc>
    <lastmod>2026-04-22T17:09:20.034Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mustang-panda-hits-india-and-s-korea-with-updated-lotuslite-backdoor-316a40</loc>
    <lastmod>2026-04-22T14:06:05.262Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bluesky-back-online-after-ddos-attack-as-iran-linked-313-team-takes-credit-05182c</loc>
    <lastmod>2026-04-22T14:06:13.919Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-gogra-malware-for-linux-uses-microsoft-graph-api-for-comms-e51bd9</loc>
    <lastmod>2026-04-22T12:06:05.687Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hackers-use-applescript-clickfix-in-fresh-macos-attacks-4d2704</loc>
    <lastmod>2026-04-22T13:10:03.043Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mirai-botnet-targets-flaw-in-discontinued-d-link-routers-deab0c</loc>
    <lastmod>2026-04-22T12:09:54.551Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/are-sboms-failing-supply-chain-attacks-rise-as-security-teams-struggle-with-sbom-bd5c8a</loc>
    <lastmod>2026-04-22T13:09:17.005Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-mythos-finds-271-firefox-vulnerabilities-235d7c</loc>
    <lastmod>2026-04-22T13:09:52.537Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-critical-asp-net-core-cve-2026-40372-privilege-escalation-bug-b5c0f3</loc>
    <lastmod>2026-04-23T02:09:13.693Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/toxic-combinations-when-cross-app-permissions-stack-into-risk-35c81b</loc>
    <lastmod>2026-04-22T16:09:47.617Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack-3dde21</loc>
    <lastmod>2026-04-22T13:09:27.581Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/and-smica83-uploaded-a-sample-to-bazaar-that-comes-from-85-239-144-4-ip-and-has--b5b87d</loc>
    <lastmod>2026-04-22T15:09:50.230Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10229191-7ee38e</loc>
    <lastmod>2026-04-23T02:09:13.521Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10233328-426701</loc>
    <lastmod>2026-04-22T11:09:17.801Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cohere-ai-terrarium-sandbox-flaw-enables-root-code-execution-container-escape-64c845</loc>
    <lastmod>2026-04-22T10:09:44.053Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mustang-panda-s-new-lotuslite-variant-targets-india-banks-south-korea-policy-cir-2c4e9d</loc>
    <lastmod>2026-04-22T10:09:35.978Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-releases-emergency-patches-for-critical-asp-net-flaw-3f3152</loc>
    <lastmod>2026-04-22T10:05:38.036Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-antigravity-in-crosshairs-of-security-researchers-cybercriminals-3e3055</loc>
    <lastmod>2026-04-22T10:06:29.411Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oracle-patches-450-vulnerabilities-with-april-2026-cpu-0878fd</loc>
    <lastmod>2026-04-22T10:09:24.532Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-1-300-microsoft-sharepoint-servers-vulnerable-to-spoofing-attacks-a79a0f</loc>
    <lastmod>2026-04-23T02:09:09.288Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-has-leaked-a-dataset-allegedly-extracted-from-pdvsa-petroleos-de--ff44a3</loc>
    <lastmod>2026-04-22T01:09:05.734Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-petrushka-is-selling-a-phishing-as-a-se-6e2092</loc>
    <lastmod>2026-04-22T00:09:44.056Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/breached-a-successor-to-the-original-breachforums-has-allegedly-suffered-an-unau-09b480</loc>
    <lastmod>2026-04-22T00:09:50.031Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/former-digitalmint-ransomware-negotiator-pleads-guilty-to-extortion-scheme-81f04b</loc>
    <lastmod>2026-04-22T00:09:35.805Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-data-f7a583</loc>
    <lastmod>2026-04-21T22:06:21.640Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploits-turn-windows-defender-into-attacker-tool-e060e1</loc>
    <lastmod>2026-04-22T00:09:26.761Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-group-nullsec-nigeria-has-made-available-a-da-496d39</loc>
    <lastmod>2026-04-21T23:09:58.792Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/seopoisoning-seen-delivering-lummastealer-via-fake-yubikey-pages-the-attack-chai-e84026</loc>
    <lastmod>2026-04-22T00:09:19.509Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-known-as-enumerate-is-selling-a-scraped-dataset-of-100-million-co-32d09f</loc>
    <lastmod>2026-04-21T23:09:34.233Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mozilla-used-anthropic-s-mythos-to-find-and-fix-271-bugs-in-firefox-b33526</loc>
    <lastmod>2026-04-21T23:09:25.966Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-lotus-data-wiper-used-against-venezuelan-energy-utility-firms-f1d46e</loc>
    <lastmod>2026-04-21T20:05:58.563Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-vulnerabilities-drop-but-critical-flaws-double-report-warns-03adea</loc>
    <lastmod>2026-04-21T20:05:41.737Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/systembc-c2-server-reveals-1-570-victims-in-the-gentlemen-ransomware-operation-20d93d</loc>
    <lastmod>2026-04-21T22:09:51.170Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scottish-man-pleads-guilty-to-attack-spree-that-created-scattered-spider-s-notor-519b84</loc>
    <lastmod>2026-04-21T21:10:01.525Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lawmakers-ponder-terrorism-designations-homicide-charges-over-hospital-ransomwar-461916</loc>
    <lastmod>2026-04-21T22:09:37.011Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/outflank-published-linux-process-injection-via-seccomp-user-notifications-4-mont-760fd7</loc>
    <lastmod>2026-04-21T21:09:53.739Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/detection-strategies-across-cloud-and-identities-against-infiltrating-it-workers-cc6eca</loc>
    <lastmod>2026-04-21T21:09:46.184Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-vulnerabilities-hit-record-high-critical-flaws-decline-report-find-cbd878</loc>
    <lastmod>2026-04-21T19:08:22.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/surge-in-bomgar-rmm-exploitation-demonstrates-supply-chain-risk-b0985e</loc>
    <lastmod>2026-04-21T21:09:36.187Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ledil-immobilier-ledil-immo-database-breached-threat-actor-888-leaks-6-700-frenc-7d34aa</loc>
    <lastmod>2026-04-21T21:09:29.432Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/2033170-digicert-misissued-code-signing-certificates-6daca4</loc>
    <lastmod>2026-04-21T18:09:55.380Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/primebeef-https-t-co-ajs6dk65pd-a-brazilian-online-service-has-allegedly-suffere-ea2207</loc>
    <lastmod>2026-04-21T20:09:59.784Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/digicert-misissued-code-signing-certificates-https-t-co-btpkshtgwe-a-malware-inc-dbbb30</loc>
    <lastmod>2026-04-21T21:09:15.503Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/senselive-x3050-1e9035</loc>
    <lastmod>2026-04-24T10:07:24.987Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-sinec-nms-e0a427</loc>
    <lastmod>2026-04-21T18:09:04.769Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-ruggedcom-crossbow-secure-access-manager-primary-90c8e2</loc>
    <lastmod>2026-04-21T18:07:53.030Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-tpm-2-0-0679ed</loc>
    <lastmod>2026-04-21T18:08:02.198Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-analytics-toolkit-249915</loc>
    <lastmod>2026-04-21T18:08:20.603Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hardy-barth-salia-ev-charge-controller-dfef76</loc>
    <lastmod>2026-04-21T18:08:38.681Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-sinec-nms-7bb186</loc>
    <lastmod>2026-04-21T18:08:47.972Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zero-motorcycles-firmware-145358</loc>
    <lastmod>2026-04-21T18:08:56.086Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-industrial-edge-management-3f8abd</loc>
    <lastmod>2026-04-21T18:09:14.971Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-ruggedcom-crossbow-station-access-controller-sac-cecfa3</loc>
    <lastmod>2026-04-21T18:09:24.469Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/forescout-uncovers-new-security-risks-in-widely-used-industrial-networking-devic-ab9bcb</loc>
    <lastmod>2026-04-21T20:09:53.379Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scattered-spider-member-tylerb-pleads-guilty-ed95ee</loc>
    <lastmod>2026-04-21T20:09:40.738Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/third-us-security-expert-admits-helping-ransomware-gang-3e851a</loc>
    <lastmod>2026-04-21T16:08:02.754Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dozens-of-malicious-crypto-apps-land-in-apple-app-store-e817b5</loc>
    <lastmod>2026-04-21T16:08:12.562Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-fixes-critical-rce-flaw-in-ai-based-antigravity-tool-e5bad3</loc>
    <lastmod>2026-04-21T20:09:31.494Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-official-municipal-website-of-porto-estrela-https-t-co-hm4kziwvei-a-city-in--bfc556</loc>
    <lastmod>2026-04-21T19:09:57.461Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ghams-200-346-613-01-fcfb63</loc>
    <lastmod>2026-04-21T17:09:18.596Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uodo-poland-dkn-5112-33-2022-95c257</loc>
    <lastmod>2026-04-21T17:09:08.918Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uodo-poland-dkn-5112-33-2022-fb6636</loc>
    <lastmod>2026-04-21T17:09:26.679Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10238270-3c3780</loc>
    <lastmod>2026-04-21T17:09:57.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023-99bc2f</loc>
    <lastmod>2026-04-21T16:09:48.932Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-offering-unauthorized-network-access-and-exfiltrated-data-from-b899da</loc>
    <lastmod>2026-04-21T15:08:37.929Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-20-gb-database-described-by-the-actor-as-an-israeli-lawyers-directory-has-been-5cada6</loc>
    <lastmod>2026-04-21T15:08:59.105Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-flags-new-sd-wan-flaw-as-actively-exploited-in-attacks-041aa7</loc>
    <lastmod>2026-04-21T14:05:21.079Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/progress-patches-multiple-vulnerabilities-in-moveit-waf-loadmaster-270bbc</loc>
    <lastmod>2026-04-21T14:07:58.008Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unsecured-perforce-servers-expose-sensitive-data-from-major-orgs-328647</loc>
    <lastmod>2026-04-21T14:09:50.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silverfort-sentinelone-securing-identities-in-the-ai-era-on-march-31-2026-a-nort-922d61</loc>
    <lastmod>2026-04-21T14:09:41.927Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anspdcp-romania-07-11-2025-dcf958</loc>
    <lastmod>2026-04-21T12:09:45.782Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bl-24-154313asd-borg-02-811f6a</loc>
    <lastmod>2026-04-21T13:09:33.067Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins-8d078e</loc>
    <lastmod>2026-04-21T13:09:12.603Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution-f631bb</loc>
    <lastmod>2026-04-21T13:09:23.911Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks-51f279</loc>
    <lastmod>2026-04-21T12:08:27.385Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/actively-exploited-apache-activemq-flaw-impacts-6-400-servers-fe2480</loc>
    <lastmod>2026-04-22T00:09:55.406Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/data-breaches-at-healthcare-organizations-in-illinois-and-texas-affect-600-000-121770</loc>
    <lastmod>2026-04-21T12:07:52.936Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/290-million-kelp-dao-crypto-heist-blamed-on-north-korea-40007c</loc>
    <lastmod>2026-04-21T12:08:10.906Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grinex-crypto-exchange-shuts-down-blames-western-agencies-for-13-7m-breach-6679dd</loc>
    <lastmod>2026-04-21T10:06:18.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ngate-android-malware-uses-handypay-nfc-app-to-steal-card-data-472501</loc>
    <lastmod>2026-04-21T10:06:09.668Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ghams-200-346-613-01-d96fbd</loc>
    <lastmod>2026-04-21T10:09:40.025Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kelpdao-suffers-290-million-heist-tied-to-lazarus-hackers-780e49</loc>
    <lastmod>2026-04-21T00:08:46.255Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/farmapatria-https-t-co-esrrvbly5q-venezuela-s-state-operated-public-pharmacy-net-4e35b2</loc>
    <lastmod>2026-04-21T00:08:53.735Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/florida-man-working-as-a-ransomware-negotiator-pleads-guilty-to-conspiracy-to-de-ef8da3</loc>
    <lastmod>2026-04-20T23:08:06.837Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/florida-man-working-as-a-ransomware-negotiator-pleads-guilty-to-conspiracy-to-de-a3bcb4</loc>
    <lastmod>2026-04-20T23:07:33.957Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-s-apple-app-store-infiltrated-by-crypto-stealing-wallet-apps-4c65a2</loc>
    <lastmod>2026-04-20T22:06:40.831Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks-706d5f</loc>
    <lastmod>2026-04-20T22:06:51.712Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-breach-linked-to-context-ai-shinyhunters-says-it-s-not-involved-2eb7b9</loc>
    <lastmod>2026-04-20T23:08:24.951Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-employee-s-ai-tool-access-led-to-data-breach-73cb49</loc>
    <lastmod>2026-04-20T22:09:39.426Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-s-security-breach-started-with-malware-disguised-as-roblox-cheats-3e586d</loc>
    <lastmod>2026-04-20T22:09:18.559Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vuln-in-google-s-antigravity-ai-agent-manager-could-escape-sandbox-give-attacker-2251fa</loc>
    <lastmod>2026-04-20T23:08:59.644Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-eight-known-exploited-vulnerabilities-to-catalog-04b7ac</loc>
    <lastmod>2026-04-25T06:08:44.446Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-april-20th-2026-45ae1b</loc>
    <lastmod>2026-04-20T22:08:53.854Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/taiseer-taiseer-co-database-breached-threat-actor-sorb-offering-pii-of-egyptian--c3f093</loc>
    <lastmod>2026-04-20T21:08:28.534Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chasing-an-angry-spark-39467f</loc>
    <lastmod>2026-04-20T22:08:12.949Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/taiseer-https-t-co-jeg6zaeqrp-database-breached-threat-actor-sorb-offering-pii-o-7f9ba2</loc>
    <lastmod>2026-04-20T21:07:33.450Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/qilin-ransomware-claims-4-companies-below-as-victims-hoeren-gartencenter-gmbh-b--b196ad</loc>
    <lastmod>2026-04-20T21:07:41.440Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cooperativa-de-hospitales-de-antioquia-cohan-has-been-claimed-a-victim-to-qilin--e5c152</loc>
    <lastmod>2026-04-20T21:07:49.637Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/seiko-usa-website-defaced-as-hacker-claims-customer-data-theft-0fa0c3</loc>
    <lastmod>2026-04-20T20:08:15.924Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chartered-institute-of-bankers-of-nigeria-cibn-database-breached-250gb-including-4be278</loc>
    <lastmod>2026-04-20T20:08:05.172Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chartered-institute-of-bankers-of-nigeria-cibn-database-breached-250gb-including-e0270f</loc>
    <lastmod>2026-04-20T20:07:31.523Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scattered-spider-member-tyler-robert-buchanan-24-of-dundee-scotland-pleaded-guil-c5e12d</loc>
    <lastmod>2026-04-20T20:07:37.103Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/serial-to-ip-devices-hide-thousands-of-old-and-new-bugs-319252</loc>
    <lastmod>2026-04-20T20:06:54.733Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files-38ca87</loc>
    <lastmod>2026-04-20T21:09:23.669Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/supply-chain-compromise-impacts-axios-node-package-manager-786b95</loc>
    <lastmod>2026-04-20T20:09:22.945Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more-b9a1fb</loc>
    <lastmod>2026-05-05T06:08:12.686Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-teams-increasingly-abused-in-helpdesk-impersonation-attacks-969935</loc>
    <lastmod>2026-04-20T16:07:32.501Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/serial-to-ip-converter-flaws-expose-ot-and-healthcare-systems-to-hacking-076339</loc>
    <lastmod>2026-04-20T16:07:16.225Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users-36445d</loc>
    <lastmod>2026-04-23T04:05:21.528Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fracturing-software-security-with-frontier-ai-models-1e520b</loc>
    <lastmod>2026-04-20T16:05:26.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-breach-traced-to-suspected-february-infostealer-infection-at-https-t-co-x-b4d07b</loc>
    <lastmod>2026-04-20T16:09:45.257Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/discover-unit-42-s-learnings-from-getting-hands-on-with-frontier-ai-models-we-il-d5e817</loc>
    <lastmod>2026-04-20T16:09:31.737Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-identified-as-scth-is-allegedly-selling-a-database-purportedly-be-ef85ab</loc>
    <lastmod>2026-04-20T16:09:38.907Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-gobernacion-del-valle-del-cauca-colombia-specifically-the-sar-sistema-admini-f37578</loc>
    <lastmod>2026-04-20T16:09:52.263Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/agoda-https-t-co-ld7wqft7em-a-booking-holdings-owned-travel-platform-has-alleged-76234c</loc>
    <lastmod>2026-04-20T16:10:05.315Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inss-institute-for-national-security-studies-israel-s-leading-national-security--f62b03</loc>
    <lastmod>2026-04-20T15:07:42.339Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/emaar-properties-and-select-group-two-major-dubai-based-real-estate-developers-h-5d33a0</loc>
    <lastmod>2026-04-20T15:07:55.767Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ssedomex-secretaria-de-seguridad-del-estado-de-mexico-the-public-security-minist-714085</loc>
    <lastmod>2026-04-20T15:09:00.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anthropic-s-mythos-makes-one-thing-clear-frontier-ai-is-collapsing-the-exploit-w-1c30a6</loc>
    <lastmod>2026-04-20T15:09:08.059Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-400fc2</loc>
    <lastmod>2026-04-20T14:09:56.298Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/british-scattered-spider-hacker-pleads-guilty-to-crypto-theft-charges-531ae3</loc>
    <lastmod>2026-04-21T00:08:58.971Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/british-scattered-spider-hacker-pleads-guilty-in-the-us-8914d2</loc>
    <lastmod>2026-04-20T14:08:20.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/british-hacker-tyler-buchanan-pleads-guilty-to-8m-hacking-scheme-in-us-7f58b5</loc>
    <lastmod>2026-04-20T14:08:03.939Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10238270-4d7736</loc>
    <lastmod>2026-04-20T14:09:48.284Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/network-background-noise-may-predict-the-next-big-edge-device-vulnerability-fd9dd0</loc>
    <lastmod>2026-04-20T12:09:06.928Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-abuse-qemu-for-defense-evasion-79138c</loc>
    <lastmod>2026-04-20T23:09:10.975Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/52m-download-protobuf-js-library-hit-by-rce-in-schema-handling-69dccd</loc>
    <lastmod>2026-04-20T12:08:13.010Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uodo-poland-dkn-5112-33-2022-ea3440</loc>
    <lastmod>2026-04-20T12:08:04.221Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fakewallet-crypto-stealer-spreading-through-ios-apps-in-the-app-store-33898c</loc>
    <lastmod>2026-04-21T02:08:28.979Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-sy-ed4c2a</loc>
    <lastmod>2026-04-27T10:08:34.768Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-releases-emergency-updates-to-fix-windows-server-issues-a490bc</loc>
    <lastmod>2026-04-20T10:08:33.338Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/half-of-the-6-million-internet-facing-ftp-servers-lack-encryption-a1d447</loc>
    <lastmod>2026-04-20T10:08:00.688Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/next-js-creator-vercel-hacked-a378d4</loc>
    <lastmod>2026-04-20T10:08:10.842Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fakewallet-crypto-stealer-spreading-through-ios-apps-in-the-app-store-a9127d</loc>
    <lastmod>2026-04-20T11:07:52.169Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-fail-to-exploit-flaw-in-discontinued-tp-link-routers-d8fc56</loc>
    <lastmod>2026-04-20T08:07:43.812Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials-8c2a6d</loc>
    <lastmod>2026-04-20T06:07:58.677Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sis-distribution-thailand-client-sub-accounts-exported-from-wasabi-8735c0</loc>
    <lastmod>2026-04-20T00:08:17.930Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-actor-shared-an-export-with-a-full-list-of-client-sub-accounts-they-were-abl-4429e0</loc>
    <lastmod>2026-04-20T00:08:31.877Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/solventum-https-t-co-9cdelgqqsn-the-nyse-listed-healthcare-technology-company-sp-8f1d45</loc>
    <lastmod>2026-04-20T00:08:25.294Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/galcomm-https-t-co-cbsstvmkx5-one-of-israel-s-largest-icann-accredited-domain-re-152896</loc>
    <lastmod>2026-04-19T23:07:07.456Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instituto-maria-schmitt-imas-a-brazilian-health-organization-that-manages-public-235d1e</loc>
    <lastmod>2026-04-19T20:08:00.598Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-has-provided-the-following-update-on-their-blog-https-t-co-f9mxncuun4-ioc-f88f4a</loc>
    <lastmod>2026-04-19T20:08:08.353Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data-99e3b0</loc>
    <lastmod>2026-04-19T18:07:09.184Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-account-change-alerts-abused-to-send-phishing-emails-57b633</loc>
    <lastmod>2026-04-19T18:07:18.668Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/just-wines-australia-a-sydney-based-online-wine-retailer-has-allegedly-suffered--46eb79</loc>
    <lastmod>2026-04-19T18:09:37.461Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-compromised-crypto-custody-account-holding-9-22998-btc-is-being-sold-on-a-popu-a79b34</loc>
    <lastmod>2026-04-19T18:09:24.753Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-basketball-federation-breached-1-9-million-members-and-800k-parents-expos-a7e9e2</loc>
    <lastmod>2026-04-19T16:09:41.017Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-34197-13-year-old-apache-activemq-rce-via-jolokia-api-surfaces-for-in-t-d5ec91</loc>
    <lastmod>2026-04-20T15:07:27.143Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/global-dining-event-diner-en-blanc-breached-411k-guest-records-with-event-detail-094495</loc>
    <lastmod>2026-04-19T16:09:23.924Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/man-who-hacked-us-supreme-court-filing-system-sentenced-to-probation-techcrunch-a2812a</loc>
    <lastmod>2026-04-19T16:08:51.254Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hacked-fecb35</loc>
    <lastmod>2026-04-19T16:09:16.229Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/per-zachxbt-kelpdao-was-drained-of-over-280m-more-than-an-hour-ago-across-ethere-8769a2</loc>
    <lastmod>2026-04-19T17:08:30.814Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/multiple-indian-schools-hit-after-ellucian-powercampus-platform-compromised-chil-7aeb15</loc>
    <lastmod>2026-04-19T18:08:37.153Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-spider321-has-shared-samples-of-an-alle-4f9555</loc>
    <lastmod>2026-04-19T18:08:59.308Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/prinz-eugen-ransomware-ip-leak-nice-find-https-t-co-vvf319ckhu-f72ef2</loc>
    <lastmod>2026-04-19T18:09:05.083Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/case-update-from-fbianchorage-u-s-authorities-conduct-cyber-operations-as-part-o-0c7cfb</loc>
    <lastmod>2026-04-19T16:05:10.028Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-0740-ninja-forms-file-uploads-up-to-v3-3-26-unauthenticated-arbitrary-f-56d56a</loc>
    <lastmod>2026-04-19T16:05:22.614Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-34197-13-year-old-apache-activemq-rce-via-jolokia-api-surfaces-for-in-t-594d17</loc>
    <lastmod>2026-04-19T16:05:28.589Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-basketball-federation-breached-1-9-million-members-and-800k-parents-expos-05466b</loc>
    <lastmod>2026-04-19T16:05:34.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-from-correios-ect-empresa-brasileira-de-correios-e-telegrafo-5942b0</loc>
    <lastmod>2026-04-19T16:05:40.686Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nobu-restaurants-data-breach-exposes-ssns-and-government-ids-on-november-5th-202-625e4f</loc>
    <lastmod>2026-04-19T16:06:20.349Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-has-allegedly-been-breached-by-shinyhunters-with-a-ransom-demand-of-2-000-d8309c</loc>
    <lastmod>2026-04-19T16:06:46.929Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/data-allegedly-obtained-from-a-compromise-of-the-dubai-health-authority-has-been-fca329</loc>
    <lastmod>2026-04-19T16:08:14.506Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-ptt-kargo-the-cargo-and-parcel-delivery-arm-of-turkiye-s-national-postal-ser-770fa8</loc>
    <lastmod>2026-04-19T16:09:52.464Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/btmob-v4-1-an-android-banking-trojan-and-remote-access-tool-rat-is-being-sold-as-d8627f</loc>
    <lastmod>2026-04-19T17:07:42.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/six-hosting-registrar-providers-described-by-the-actor-as-german-registrars-have-7889c3</loc>
    <lastmod>2026-04-19T17:07:49.708Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lms-kemkes-the-official-learning-management-system-of-indonesia-s-ministry-of-he-76c751</loc>
    <lastmod>2026-04-19T17:07:55.694Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-containing-400-000-customer-records-from-https-t-co-ayodx9mc-be7945</loc>
    <lastmod>2026-04-19T17:09:25.231Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tamm-https-t-co-9gq9c2fexh-saudi-arabia-s-government-services-platform-has-alleg-a0630c</loc>
    <lastmod>2026-04-19T17:08:02.670Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/authorities-joined-forces-to-crack-down-on-a-20m-phishing-ring-and-jailed-two-fo-69a43a</loc>
    <lastmod>2026-04-19T17:09:11.047Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-massive-database-dubbed-morgue-containing-251-million-brazilian-cpf-records-ha-f9bc53</loc>
    <lastmod>2026-04-19T17:09:54.760Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/metro-pakistan-a-major-wholesale-retailer-has-allegedly-suffered-an-unauthorized-8728c3</loc>
    <lastmod>2026-04-19T17:08:37.368Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/records-from-the-escuela-de-participacion-platform-of-colombia-s-ministry-of-int-88b486</loc>
    <lastmod>2026-04-19T17:08:49.891Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/data-allegedly-from-grupo-xcaret-experiencias-xcaret-a-major-mexican-tourism-and-86e626</loc>
    <lastmod>2026-04-19T17:08:56.797Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/an-iranian-insurance-and-personal-data-database-allegedly-from-pisheaz-has-been--388048</loc>
    <lastmod>2026-04-19T17:09:39.157Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-conviasa-airlines-venezuela-s-state-owned-airline-has-allegedly-suffered-a-m-e1e0e8</loc>
    <lastmod>2026-04-19T17:09:45.628Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-ahmadxalil-is-selling-an-alleged-iraqi--a0f2a7</loc>
    <lastmod>2026-04-19T18:08:45.833Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-lists-8-companies-and-1-leaked-company-marcus-amp-millichap-inc-al-06d5aa</loc>
    <lastmod>2026-04-19T18:09:13.190Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nist-to-stop-rating-non-priority-flaws-due-to-volume-increase-8279fe</loc>
    <lastmod>2026-04-19T16:06:40.826Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-flaw-in-protobuf-library-enables-javascript-code-execution-c96c03</loc>
    <lastmod>2026-04-18T18:08:22.764Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/showdoc-vulnerability-patched-in-2020-now-used-in-active-server-takeovers-c1d559</loc>
    <lastmod>2026-04-18T18:08:30.939Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cross-tenant-helpdesk-impersonation-to-data-exfiltration-a-human-operated-intrus-f62c54</loc>
    <lastmod>2026-04-18T18:08:15.696Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tycoon-2fa-loses-phishing-kit-crown-amid-surge-in-attacks-604900</loc>
    <lastmod>2026-04-18T13:05:54.946Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/operation-poweroff-75k-users-of-ddos-for-hire-services-identified-and-warned-a293a2</loc>
    <lastmod>2026-04-19T02:05:40.785Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/it-takes-2-minutes-to-hack-the-eu-s-new-age-verification-app-b3fa11</loc>
    <lastmod>2026-04-18T12:05:44.864Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims-0deea6</loc>
    <lastmod>2026-04-18T10:08:05.300Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tycoon-2fa-phishers-scatter-adopt-device-code-phishing-3458ed</loc>
    <lastmod>2026-04-17T22:05:51.291Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-recruitrat-saferrat-astrinox-massiv-android-malware-found-targeting-800-apps-0ac148</loc>
    <lastmod>2026-04-17T20:05:28.599Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security-427525</loc>
    <lastmod>2026-04-18T17:05:17.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-race-to-quantum-proof-the-internet-has-already-begun-babed7</loc>
    <lastmod>2026-04-17T18:05:22.431Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-mirai-variant-nexcorium-hijacks-dvr-devices-for-ddos-attacks-13524e</loc>
    <lastmod>2026-04-17T16:05:51.578Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/containing-a-domain-compromise-how-predictive-shielding-shut-down-lateral-moveme-f66bbf</loc>
    <lastmod>2026-04-17T16:05:42.031Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10229191-0ec685</loc>
    <lastmod>2026-04-17T16:05:26.196Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-an-underground-guide-how-threat-actors-vet-stolen-credit-card-shops-935973</loc>
    <lastmod>2026-04-17T16:05:15.622Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched-753b14</loc>
    <lastmod>2026-04-18T10:08:08.089Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-fd80fe</loc>
    <lastmod>2026-04-17T14:05:44.021Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-cbb50c</loc>
    <lastmod>2026-04-17T14:08:46.468Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/another-draftkings-hacker-sentenced-to-prison-6641bd</loc>
    <lastmod>2026-04-17T12:08:19.333Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-satellite-cybersecurity-act-90k-chrome-flaw-teen-hacker-arrested-5d5b8f</loc>
    <lastmod>2026-04-24T05:07:02.474Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
</urlset>