<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://threatnoir.com/</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/feed</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/iocs</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/podcast</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/podcast/archive</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/awareness</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/resources</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/developer</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/review</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/contact</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/legal</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/subscribe</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/auth/signup</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/auth/login</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ai-security</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/breaches</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ccpa-cpra</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/cloud-security</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/compliance</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/cryptography</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/dora</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/dsa-dma</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-ai-act</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-cyber-resilience-act</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-cybersecurity-act</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/gdpr</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/hipaa</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/identity-access</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/incident-response</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/iot-ot</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/malware</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nation-state</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nis2</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nist</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/open-source</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/pci-dss</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/policy</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/privacy</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/privacy-fines</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ransomware</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/sec-cyber</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/supply-chain</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/threat-intelligence</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/tools</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/uk-data-protection</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/vulnerabilities</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/zero-day</loc>
    <lastmod>2026-04-08T22:25:01.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w14</loc>
    <lastmod>2026-04-06T00:02:09.939Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w13</loc>
    <lastmod>2026-03-31T19:50:57.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/a-well-known-initial-access-broker-is-selling-root-level-remote-code-execution-a-mnq4jkqg</loc>
    <lastmod>2026-04-08T14:09:16.345Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/russian-forest-blizzard-hackers-hijack-home-routers-for-global-spying-mnq4jdon</loc>
    <lastmod>2026-04-08T14:09:07.169Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto-mnq4jb72</loc>
    <lastmod>2026-04-08T14:09:04.203Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released-mnn9mfvv</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-mnn9me4z</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/hackers-exploit-react2shell-in-automated-credential-theft-campaign-mnn9mhj4</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities-mnkcn0gz</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more--mnkcn428</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack-mnkcn24d</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cspm-review-course-may-2026</loc>
    <lastmod>2026-04-04T02:01:18.324Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/humanx-san-francisco-2026</loc>
    <lastmod>2026-04-02T11:40:07.626Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/entelec-conference-expo-2026</loc>
    <lastmod>2026-04-02T11:40:07.045Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-san-diego-2026</loc>
    <lastmod>2026-04-02T11:40:06.441Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-milwaukee-2026</loc>
    <lastmod>2026-04-02T11:40:05.799Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyera-product-spotlight-dspm-datawatcher-in-action-from-data-chaos-to-data-zen-2</loc>
    <lastmod>2026-04-02T11:40:05.253Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/interference-ahead-why-the-security-industry-is-fighting-a-monopolistic-wireless</loc>
    <lastmod>2026-04-02T10:32:27.180Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/spm-seminar-at-psa-tec-2026</loc>
    <lastmod>2026-04-02T10:32:26.672Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-national-capital-region-security-forum-april-2026-networking</loc>
    <lastmod>2026-04-02T10:32:26.175Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/donversations-live-with-special-guest-scott-elkins</loc>
    <lastmod>2026-04-02T10:32:25.669Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/vertical-insights-stadium-security-symposium</loc>
    <lastmod>2026-04-02T10:32:25.168Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/siathere-new-york-new-jersey</loc>
    <lastmod>2026-04-02T10:32:24.657Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/how-to-gain-it-ot-visibility-and-protect-uptime-with-owl-talon-data-diodes</loc>
    <lastmod>2026-04-02T10:32:13.643Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/everyone-is-deploying-ai-agents-almost-nobody-knows-what-they-re-doing</loc>
    <lastmod>2026-04-02T10:32:12.540Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-mussoorie-2026</loc>
    <lastmod>2026-04-02T10:32:12.056Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyera-product-spotlight-dspm-datawatcher-in-action-from-data-chaos-to-data-zen</loc>
    <lastmod>2026-04-02T10:32:11.442Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/driving-real-world-resilience-with-technical-exercising-on-immersive-one</loc>
    <lastmod>2026-04-02T10:32:11.054Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/tales-from-the-trenches</loc>
    <lastmod>2026-04-02T10:32:10.691Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ciomeet-chicago-2026</loc>
    <lastmod>2026-04-02T10:32:10.319Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/middle-east-escalation-strengthening-ot-resilience-in-a-rapidly-evolving-threat-</loc>
    <lastmod>2026-04-02T10:32:09.932Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/notiones-final-conference-2026</loc>
    <lastmod>2026-04-02T10:32:09.566Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/introducing-q-firm-android-firmware-security-testing-before-devices-ship</loc>
    <lastmod>2026-04-02T10:32:09.062Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/tracing-a-multi-vector-malware-campaign-from-vbs-to-open-infrastructure</loc>
    <lastmod>2026-04-02T10:32:08.630Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/spies-lies-and-cybercrime-building-a-scalable-cyber-resilience-strategy</loc>
    <lastmod>2026-04-02T10:32:08.225Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infostealers-your-digital-drug-dealers</loc>
    <lastmod>2026-04-02T10:32:07.771Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/architecting-identity-guardrails-for-agentic-ai</loc>
    <lastmod>2026-04-02T10:32:07.294Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/owasp-italy-day-2026</loc>
    <lastmod>2026-04-02T10:31:32.629Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/it-security-summit-berlin</loc>
    <lastmod>2026-04-02T10:31:31.963Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/european-open-source-security-forum</loc>
    <lastmod>2026-04-02T10:31:31.503Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/include-conf-2026</loc>
    <lastmod>2026-04-02T10:31:31.072Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/elbsides-2026</loc>
    <lastmod>2026-04-02T10:31:30.463Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infosecurity-europe</loc>
    <lastmod>2026-04-02T10:31:29.708Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/security-fest</loc>
    <lastmod>2026-04-02T10:31:28.969Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/update-conference-krakow-2026</loc>
    <lastmod>2026-04-02T10:31:27.988Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/it-grc-kongress-2026</loc>
    <lastmod>2026-04-02T10:31:27.465Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/confidence-2026</loc>
    <lastmod>2026-04-02T10:31:26.934Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cysat-europe</loc>
    <lastmod>2026-04-02T10:31:25.849Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberwisecon-europe-2026</loc>
    <lastmod>2026-04-02T10:31:25.057Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-security-summit-london</loc>
    <lastmod>2026-04-02T10:31:23.321Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-groningen-2026</loc>
    <lastmod>2026-04-02T10:31:22.470Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/manageengine-roadshow-2026</loc>
    <lastmod>2026-04-02T10:31:21.720Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-threat-intelligence-conference-2026</loc>
    <lastmod>2026-04-02T10:31:20.934Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/secure-2026</loc>
    <lastmod>2026-04-02T10:31:19.583Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/notiones-final-conference</loc>
    <lastmod>2026-04-02T10:31:18.488Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/95fa2e67-7bcd-4c70-b063-80d78dc74624</loc>
    <lastmod>2026-04-04T15:35:46.190Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/a93a00d5-6ca2-4219-86a8-4056d5ca8cf7</loc>
    <lastmod>2026-04-04T15:35:33.077Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/1934800e-de70-4ee9-a027-4d5c5858fee3</loc>
    <lastmod>2026-03-25T19:33:45.057Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets-9c5d43</loc>
    <lastmod>2026-04-08T22:07:27.510Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-veguidize-allegedly-leaked-a-database-from-a-compromised-server-con-a8c173</loc>
    <lastmod>2026-04-08T21:07:47.239Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-exploited-ivanti-epmm-flaw-by-sunday-85f1e4</loc>
    <lastmod>2026-04-08T20:08:24.551Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-macos-stealer-campaign-uses-script-editor-in-clickfix-attack-1148ff</loc>
    <lastmod>2026-04-08T20:08:16.091Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy-446f36</loc>
    <lastmod>2026-04-08T20:07:59.633Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apt-c-23-is-back-to-targeting-in-israel-using-micropsia-found-a-possible-interes-49d561</loc>
    <lastmod>2026-04-08T20:07:36.451Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-trd-is-allegedly-selling-two-databases-containing-2-1-million-new-y-4255c2</loc>
    <lastmod>2026-04-08T19:08:00.957Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/m6plus-proof-of-concept-poc-cve-2026-4583-missing-replay-protection-the-m6plus-b-fafe5e</loc>
    <lastmod>2026-04-08T19:07:53.080Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-6d81ab</loc>
    <lastmod>2026-04-08T18:08:44.689Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-shanghai-fudan-microelectronics-leaks-175mb-of-ic-schematics-i-c004dd</loc>
    <lastmod>2026-04-08T18:08:14.902Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-shanghai-fudan-microelectronics-leaks-175mb-of-ic-schematics-i-f74adf</loc>
    <lastmod>2026-04-08T18:08:37.678Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/13-year-old-bug-in-activemq-lets-hackers-remotely-execute-commands-5a3a6b</loc>
    <lastmod>2026-04-08T18:08:23.354Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices-7499d0</loc>
    <lastmod>2026-04-08T18:08:06.793Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/operation-masquerade-fbi-disrupts-russian-router-hacking-campaign-29dbab</loc>
    <lastmod>2026-04-08T18:07:56.194Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa-970ead</loc>
    <lastmod>2026-04-08T18:07:47.340Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gunra-ransomware-claims-16-victims-kukje-pharm-co-ltd-bkksky-com-triotech-7531cb</loc>
    <lastmod>2026-04-08T17:07:54.514Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-advertising-a-session-id-hijacking-service-claiming-the-abilit-557e3a</loc>
    <lastmod>2026-04-08T17:08:18.480Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tl-dr-north-korean-state-sponsored-hacker-accidentally-detonates-information-ste-c0b312</loc>
    <lastmod>2026-04-08T17:08:25.670Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/most-organisations-face-an-unsecured-api-surge-as-ai-agents-outpace-security-5e36cf</loc>
    <lastmod>2026-04-08T16:09:19.187Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/data-leakage-vulnerability-patched-in-openssl-77539b</loc>
    <lastmod>2026-04-08T16:09:00.562Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rce-bug-lurked-in-apache-activemq-classic-for-13-years-60eedc</loc>
    <lastmod>2026-04-08T16:09:10.211Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/actor-coderx-shared-a-758mb-database-dump-from-eastern-illinois-university-conta-abc048</loc>
    <lastmod>2026-04-08T16:08:00.927Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-c00lssh-is-offering-anonymous-offshore-vps-rdp-hosting-services-wit-e72761</loc>
    <lastmod>2026-04-08T16:07:53.584Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-threat-actors-claim-to-be-selling-financial-data-from-sufi-a-financing-compa-8e7b4a</loc>
    <lastmod>2026-04-08T16:08:07.335Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-threat-actors-disrupt-us-critical-infrastructure-via-exposed-plcs-cfe2ec</loc>
    <lastmod>2026-04-08T16:07:38.483Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/montana-empire-is-an-ai-assisted-phishing-kit-mimicking-a-national-postal-servic</loc>
    <lastmod>2026-04-08T15:49:52.249Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-have-leaked-amainterview-ai-database-containing-persona</loc>
    <lastmod>2026-04-08T15:49:52.388Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/systemautoupdater-com-mon-systemautoupdater-com-23-27-141-44-https-t-co-exbr94bu</loc>
    <lastmod>2026-04-08T15:49:42.753Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-cybercrime-losses-neared-21-billion-in-2025</loc>
    <lastmod>2026-04-08T16:09:47.580Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/massachusetts-hospital-diverts-ambulances-as-cyberattack-causes-disruption</loc>
    <lastmod>2026-04-08T15:49:41.327Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/evasive-masjesu-ddos-botnet-targets-iot-devices</loc>
    <lastmod>2026-04-08T15:49:20.133Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-targeting-ninja-forms-vulnerability-that-exposes-wordpress-sites-to-take</loc>
    <lastmod>2026-04-08T15:49:28.137Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-disrupts-russian-espionage-operation-involving-hacked-routers-and-dns-hijacki</loc>
    <lastmod>2026-04-08T15:49:30.163Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10234984</loc>
    <lastmod>2026-04-08T15:48:46.790Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10234984-2</loc>
    <lastmod>2026-04-08T15:48:49.803Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-forest-blizzard-hackers-hijack-home-routers-for-global-spying</loc>
    <lastmod>2026-04-08T15:48:44.044Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/python-supply-chain-compromise-schneier-on-security</loc>
    <lastmod>2026-04-08T15:48:37.359Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anthropic-s-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems</loc>
    <lastmod>2026-04-08T15:48:35.034Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/n-korean-hackers-spread-1-700-malicious-packages-across-npm-pypi-go-rust</loc>
    <lastmod>2026-04-08T21:06:23.972Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto</loc>
    <lastmod>2026-04-08T15:48:36.049Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/financial-cyberthreats-in-2025-and-the-outlook-for-2026</loc>
    <lastmod>2026-04-08T15:48:35.181Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/related-archive-contains-legit-signed-winword-exe-from-microsoft-to-load-a-malic</loc>
    <lastmod>2026-04-08T15:48:27.630Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-ex</loc>
    <lastmod>2026-04-08T15:48:27.027Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gt-be-united-states-government-gt-say-state-sponsored-iranian-threat-actors-targ</loc>
    <lastmod>2026-04-08T15:48:23.037Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-linked-hackers-disrupt-us-critical-infrastructure-via-plc-attacks</loc>
    <lastmod>2026-04-08T15:48:22.598Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-well-known-initial-access-broker-is-selling-root-level-remote-code-execution-a</loc>
    <lastmod>2026-04-08T15:48:20.944Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/feds-quash-widespread-russia-backed-espionage-network-spanning-18-000-devices</loc>
    <lastmod>2026-04-08T15:48:19.827Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-shared-a-database-dump-from-mhi-org-containing-personal-and-profe</loc>
    <lastmod>2026-04-08T15:48:18.133Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin</loc>
    <lastmod>2026-04-08T15:47:50.115Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-normallevrai-is-selling-alleged-service-telecom-database-containing</loc>
    <lastmod>2026-04-08T15:47:44.445Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grafana-patches-ai-bug-that-could-have-leaked-user-data</loc>
    <lastmod>2026-04-08T15:47:42.580Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/storm-1175-deploys-medusa-ransomware-at-high-velocity</loc>
    <lastmod>2026-04-08T15:47:42.156Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/justice-department-conducts-court-authorized-disruption-of-dns-hijacking-network</loc>
    <lastmod>2026-04-08T15:47:40.495Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-april-7th-2026</loc>
    <lastmod>2026-04-08T19:05:44.791Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chipsoft-a-dutch-company-that-develops-electronic-patient-record-epr-software-is</loc>
    <lastmod>2026-04-08T15:47:38.141Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/doj-disrupts-russian-military-intelligence-dns-hijacking-operation-through-court</loc>
    <lastmod>2026-04-08T15:47:38.352Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure</loc>
    <lastmod>2026-04-08T15:47:37.558Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-28286-zimaos-privilege-escalation-vulnerability-poc-https-t-co-9p04qud3</loc>
    <lastmod>2026-04-08T15:47:32.575Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-hackers-launching-disruptive-attacks-at-u-s-energy-water-targets-feds-wa</loc>
    <lastmod>2026-04-08T15:47:25.009Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tech-giants-launch-ai-powered-project-glasswing-to-identify-critical-software-vu</loc>
    <lastmod>2026-04-08T15:47:24.518Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-selling-1-2-million-french-ficoba-banking-leads-with-ibans-ssns-and-2</loc>
    <lastmod>2026-04-08T18:09:09.332Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-23398-linux-kernel-icmp-dos-vulnerability-poc-https-t-co-qd3vo8jhaf</loc>
    <lastmod>2026-04-08T15:47:18.877Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-selling-1-2-million-french-ficoba-banking-leads-with-ibans-ssns-and</loc>
    <lastmod>2026-04-08T15:47:24.315Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-sup</loc>
    <lastmod>2026-04-08T15:47:29.401Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anthropic-teams-up-with-its-rivals-to-keep-ai-from-hacking-everything</loc>
    <lastmod>2026-04-08T15:47:22.809Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach</loc>
    <lastmod>2026-04-08T15:47:18.810Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-warns-of-iranian-hackers-targeting-critical-infrastructure</loc>
    <lastmod>2026-04-08T15:47:21.502Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-fbi-has-released-a-joint-cybersecurity-advisory-on-iranian-affiliated-cyber-</loc>
    <lastmod>2026-04-08T15:47:01.762Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-new-rules-of-engagement-matching-agentic-attack-speed</loc>
    <lastmod>2026-04-08T15:50:16.014Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks</loc>
    <lastmod>2026-04-08T16:10:04.919Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mitsubishi-electric-genesis64-and-iconics-suite-products</loc>
    <lastmod>2026-04-08T15:50:15.797Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-selling-root-rce-shell-access-to-botswana-government-health-portal--2</loc>
    <lastmod>2026-04-08T16:10:04.702Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-selling-root-rce-shell-access-to-botswana-government-health-portal-</loc>
    <lastmod>2026-04-08T15:49:47.224Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/this-hacker-intelbroker-kept-embarrassing-the-fbi-https-t-co-g1attq1tgo</loc>
    <lastmod>2026-04-08T15:50:15.645Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-mclovin-is-allegedly-selling-a-database-containing-4-6-million-robi</loc>
    <lastmod>2026-04-08T15:46:45.837Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-onardev-is-allegedly-selling-a-dataset-containing-personal-informat</loc>
    <lastmod>2026-04-08T15:46:47.917Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-mclovin-is-selling-a-database-containing-810-million-chinese-shoppi</loc>
    <lastmod>2026-04-08T15:50:15.381Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nyxargroup-and-collaborators-are-allegedly-selling-personal-information-from-col</loc>
    <lastmod>2026-04-08T15:50:15.732Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russia-hacked-routers-to-steal-microsoft-office-tokens</loc>
    <lastmod>2026-04-08T15:50:15.448Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaig</loc>
    <lastmod>2026-04-08T15:46:55.931Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-pose-as-non-profit-developers-to-deploy-monero-mining-malware</loc>
    <lastmod>2026-04-08T15:50:15.577Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cybercrime-losses-jumped-26-to-20-9-billion-in-2025</loc>
    <lastmod>2026-04-08T15:50:15.308Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-jinkusu-advertises-omnitrix-imap-service-offering-email-account-mon</loc>
    <lastmod>2026-04-08T15:50:15.178Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/you-clicked-what-you-thought-was-an-event-invitation-that-s-all-it-took-elastic-</loc>
    <lastmod>2026-04-08T15:50:15.243Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-flowise-vulnerability-in-attacker-crosshairs</loc>
    <lastmod>2026-04-08T15:49:47.513Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/severe-strongbox-vulnerability-patched-in-android</loc>
    <lastmod>2026-04-08T15:50:14.843Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attack</loc>
    <lastmod>2026-04-08T15:50:14.179Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins</loc>
    <lastmod>2026-04-08T15:50:14.388Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-possess-over-609-000-email-records-from-hisense-usa-obt</loc>
    <lastmod>2026-04-08T15:50:14.246Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-have-obtained-databases-from-plan-ceibal-a-uruguayan-go</loc>
    <lastmod>2026-04-08T15:50:14.918Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-lvn4t1k0-allegedly-leaked-personal-data-from-conalep-morelos-includ</loc>
    <lastmod>2026-04-08T15:50:14.983Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access</loc>
    <lastmod>2026-04-08T15:50:14.112Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grafanaghost-vulnerability-allows-silent-data-theft-via-ai-injection</loc>
    <lastmod>2026-04-08T15:50:14.709Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/signals-from-the-cloud-security-forecast-2026-cloud-risk-is-scaling-through-desi</loc>
    <lastmod>2026-04-08T15:50:14.644Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-internal-and-confidential-databases-of-banco-agrario-de-colombia-a-state-own</loc>
    <lastmod>2026-04-08T15:50:14.047Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data</loc>
    <lastmod>2026-04-08T15:50:13.384Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10234984-3</loc>
    <lastmod>2026-04-08T15:50:13.910Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apt28-exploit-routers-to-enable-dns-hijacking-operations</loc>
    <lastmod>2026-04-08T15:50:13.254Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-uk-has-exposed-russian-military-intelligence-targeting-vulnerable-routers-to</loc>
    <lastmod>2026-04-08T15:50:13.647Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-agents-and-non-human-identities-creating-critical-security-gaps-report</loc>
    <lastmod>2026-04-08T15:50:13.515Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grafanaghost-bypasses-grafana-s-ai-defenses-without-leaving-a-trace</loc>
    <lastmod>2026-04-08T15:50:13.449Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems</loc>
    <lastmod>2026-04-08T15:50:13.045Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gpubreach-root-shell-access-achieved-via-gpu-rowhammer-attack</loc>
    <lastmod>2026-04-08T15:50:12.981Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202308705</loc>
    <lastmod>2026-04-08T15:50:13.118Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/german-police-unmask-revil-ransomware-leader</loc>
    <lastmod>2026-04-08T15:50:12.832Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips</loc>
    <lastmod>2026-04-08T15:50:12.458Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hong-kong-police-can-force-you-to-reveal-your-encryption-keys-schneier-on-securi</loc>
    <lastmod>2026-04-08T15:47:25.285Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hong-kong-police-can-force-you-to-reveal-your-encryption-keys-https-t-co-hpa2lfo</loc>
    <lastmod>2026-04-08T15:50:12.327Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-have-found-2-whql-signed-kernel-drivers-exposing-arbitrary-code-execution-via</loc>
    <lastmod>2026-04-08T15:50:12.587Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/wynn-resorts-says-21-000-employees-affected-by-shinyhunters-hack</loc>
    <lastmod>2026-04-08T15:50:12.184Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12-000-instance</loc>
    <lastmod>2026-04-08T15:50:12.053Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/german-authorities-identify-revil-and-gangcrab-ransomware-bosses</loc>
    <lastmod>2026-04-08T15:50:11.777Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-customers-confront-actively-exploited-zero-day-with-a-full-patch-still-</loc>
    <lastmod>2026-04-08T15:47:03.093Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-issues-emergency-patch-for-forticlient-zero-day</loc>
    <lastmod>2026-04-08T15:47:02.442Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-assisted-supply-chain-attack-targets-github</loc>
    <lastmod>2026-04-08T15:50:11.371Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/axios-attack-shows-social-complex-engineering-is-industrialized</loc>
    <lastmod>2026-04-08T15:50:11.440Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer</loc>
    <lastmod>2026-04-08T15:50:00.801Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit</loc>
    <lastmod>2026-04-08T15:50:10.884Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organiz</loc>
    <lastmod>2026-04-08T15:50:11.031Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-the-database-of-mylovely-ai-an-nsfw-ai-image-generation-platform-has-alleged</loc>
    <lastmod>2026-04-08T15:50:10.549Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-sql-database-dump-from-https-t-co-tqmyu2yacy-containing-30-000-user-records-wi</loc>
    <lastmod>2026-04-08T15:50:10.686Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release</loc>
    <lastmod>2026-04-08T15:50:10.085Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-an-ai-enabled-device-code-phishing-campaign</loc>
    <lastmod>2026-04-08T15:50:09.950Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ran</loc>
    <lastmod>2026-04-08T15:47:46.244Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-35616-forticlient-ems-pre-auth-api-bypass-under-active-exploitation</loc>
    <lastmod>2026-04-08T15:50:10.484Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-colombia-x27-s-huila-department-government-extranet-exposes-of</loc>
    <lastmod>2026-04-08T15:50:10.019Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-35616-forticlient-ems-pre-auth-api-bypass-under-active-exploitation-htt</loc>
    <lastmod>2026-04-08T15:48:50.624Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday</loc>
    <lastmod>2026-04-08T15:50:13.977Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/drift-280m-crypto-theft-linked-to-6-month-in-person-operation</loc>
    <lastmod>2026-04-08T15:50:11.306Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-kore</loc>
    <lastmod>2026-04-08T15:50:10.420Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins</loc>
    <lastmod>2026-04-08T15:50:10.148Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-kbank-vietnam-exposes-10-1-million-credit-registration-records-2</loc>
    <lastmod>2026-04-08T15:50:09.882Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-kbank-vietnam-exposes-10-1-million-credit-registration-records</loc>
    <lastmod>2026-04-08T15:48:38.948Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-be-selling-a-complete-mexican-taxpayer-database-from-sa</loc>
    <lastmod>2026-04-08T15:50:09.482Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/df-owner-knox-is-claiming-to-be-selling-a-complete-database-backup-and-source-co</loc>
    <lastmod>2026-04-08T15:50:09.418Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-allegedly-leaked-data-from-mexicos-ministry-of-health-containing-</loc>
    <lastmod>2026-04-08T15:50:09.546Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/internal-and-confidential-databases-from-emergiacc-colsubsidio-in-house-containi</loc>
    <lastmod>2026-04-08T15:50:09.611Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-simple-breach-monitoring-is-no-longer-enough</loc>
    <lastmod>2026-04-08T15:50:09.354Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-12</loc>
    <lastmod>2026-04-08T15:50:10.748Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/automated-credential-harvesting-campaign-exploits-react2shell-flaw</loc>
    <lastmod>2026-04-08T15:50:08.533Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-deepmind-researchers-map-web-attacks-against-ai-agents</loc>
    <lastmod>2026-04-08T15:50:09.679Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-have-compromised-ezhire-car-rental-service-allegedly-ob</loc>
    <lastmod>2026-04-08T15:50:09.087Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers</loc>
    <lastmod>2026-04-08T15:50:08.952Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hackers-pose-as-trading-firm-to-steal-285m-from-drift</loc>
    <lastmod>2026-04-08T15:50:08.743Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/guardarian-users-targeted-with-malicious-strapi-npm-packages</loc>
    <lastmod>2026-04-08T15:50:08.601Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hackers-target-high-profile-node-js-maintainers</loc>
    <lastmod>2026-04-08T15:50:08.671Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-wants-to-transition-to-post-quantum-cryptography-by-2029-https-t-co-sz8cd</loc>
    <lastmod>2026-04-08T15:47:31.184Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-rushes-emergency-fixes-for-exploited-zero-day</loc>
    <lastmod>2026-04-08T15:50:08.323Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks</loc>
    <lastmod>2026-04-08T15:50:08.183Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab</loc>
    <lastmod>2026-04-08T15:50:11.844Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released</loc>
    <lastmod>2026-04-08T15:50:07.908Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts</loc>
    <lastmod>2026-04-08T15:50:07.840Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/around-2-hours-ago-01-22est-it-appears-ilspy-wordpress-domain-was-compromised-to</loc>
    <lastmod>2026-04-08T15:50:07.767Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation</loc>
    <lastmod>2026-04-08T15:50:07.695Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-jinkusu-is-selling-the-source-code-for-evilnote-a-bulk-email-sendin</loc>
    <lastmod>2026-04-08T15:50:07.562Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/browsergate-linkedin-tracks-6-000-browser-extensions-on-users-pcs</loc>
    <lastmod>2026-04-08T15:50:07.494Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-jinkusu-advertises-sophisticated-deepfake-and-voice-manipulation-so</loc>
    <lastmod>2026-04-08T15:50:07.361Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-breachforums-like-clone-clearnet-pwnforums-st-dark-web-http-pwnfrm7rbf6kyeri</loc>
    <lastmod>2026-04-08T15:50:07.429Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-react2shell-in-automated-credential-theft-campaign</loc>
    <lastmod>2026-04-08T15:50:07.224Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-published-internal-databases-from-colombian-financial-institution</loc>
    <lastmod>2026-04-08T15:50:07.159Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-hack-that-exposed-syria-s-sweeping-security-failures</loc>
    <lastmod>2026-04-08T15:50:06.605Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems</loc>
    <lastmod>2026-04-08T15:50:07.087Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/wynn-resorts-has-sent-a-consumer-notification-to-those-affected-by-the-shinyhunt</loc>
    <lastmod>2026-04-08T15:50:06.738Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account</loc>
    <lastmod>2026-04-08T15:50:06.672Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/root-level-firewall-access-to-an-unnamed-major-us-financial-services-corporation</loc>
    <lastmod>2026-04-08T15:50:06.539Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/paraguay-s-civil-status-registry-registro-del-estado-civil-allegedly-has-its-dat</loc>
    <lastmod>2026-04-08T15:49:47.951Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc1069-targets-node-js-maintainers-via-fake-linkedin-slack-profiles</loc>
    <lastmod>2026-04-08T15:50:06.472Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/salary-slips-exe-dont-delete-exe-important-exe-these-are-the-filenames-brushworm</loc>
    <lastmod>2026-04-08T15:50:06.407Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/linkedin-secretly-scans-for-6-000-chrome-extensions-collects-data</loc>
    <lastmod>2026-04-08T15:50:06.804Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:50:06.272Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-are-posting-the-claude-code-leak-with-bonus-malware</loc>
    <lastmod>2026-04-08T15:50:05.066Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/latin-america-and-the-caribbean-cybercrime-landscape</loc>
    <lastmod>2026-04-08T15:47:47.764Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zyght-a-hse-health-safety-amp-environment-software-platform-has-allegedly-been-b</loc>
    <lastmod>2026-04-08T15:50:05.334Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/forum-ip-leak-forum-rehub-ip-5-175-247-131-ports-22-25-asn-213501-oni</loc>
    <lastmod>2026-04-08T15:50:04.726Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/europe-s-cyber-agency-blames-hacking-gangs-for-massive-data-breach-and-leak-tech</loc>
    <lastmod>2026-04-08T15:50:04.385Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/i-have-posted-about-this-tool-before-but-this-is-a-new-forum-post-a-threat-actor</loc>
    <lastmod>2026-04-08T15:50:04.519Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-european-union-s-cybersecurity-agency-announced-thursday-that-a-cyberattack-</loc>
    <lastmod>2026-04-08T15:50:05.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk</loc>
    <lastmod>2026-04-08T15:50:04.100Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/linkedin-secretely-scans-for-6-000-chrome-extensions-collects-data</loc>
    <lastmod>2026-04-08T15:49:42.820Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/double-agents-exposing-security-blind-spots-in-gcp-vertex-ai</loc>
    <lastmod>2026-04-08T15:50:03.971Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-chatgpt-ad-blocker-chrome-extension-caught-spying-on-users</loc>
    <lastmod>2026-04-08T15:50:03.908Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-alleged-sale-of-initial-access-to-a-usa-managed-services-provider-a-us-gover</loc>
    <lastmod>2026-04-08T15:50:03.773Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ransomware-group-krybit-krybitxdpxohsmjooeb3gbgpmdddreh6mnflzac6bnezz74b7yje</loc>
    <lastmod>2026-04-08T15:50:03.838Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-agents-can-turn-into-double-agents-if-compromised-our-research-found-a-critic</loc>
    <lastmod>2026-04-08T15:50:04.239Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/2-2-alleged-sale-of-initial-access-to-an-iraq-higher-education-platform-an-afric</loc>
    <lastmod>2026-04-08T15:50:03.707Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sentinelone-s-ai-edr-autonomously-stops-a-zero-day-attack-axios-supply-chain-att</loc>
    <lastmod>2026-04-08T15:50:05.400Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ransomware-group-krybit-krybitxdpxohsmjooeb3gbgpmdddreh6mnflzac6bnezz74b7yje-2</loc>
    <lastmod>2026-04-08T15:50:05.465Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-breaks-precedent-patches-darksword-for-ios-18</loc>
    <lastmod>2026-04-08T15:50:03.376Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/saudi-arabia-s-chamber-of-commerce-allegedly-had-478-000-active-business-contact</loc>
    <lastmod>2026-04-08T15:50:05.539Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rdweb-access-to-an-unnamed-netherlands-based-software-company-is-allegedly-being</loc>
    <lastmod>2026-04-08T15:50:03.441Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/imss-tlaxcala-instituto-mexicano-del-seguro-social-has-allegedly-had-its-data-le</loc>
    <lastmod>2026-04-08T15:50:05.675Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/incogniton-a-multi-accounting-anti-detect-browser-is-being-promoted-on-a-popular</loc>
    <lastmod>2026-04-08T15:50:03.237Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hims-hers-warns-of-data-breach-after-zendesk-support-ticket-breach</loc>
    <lastmod>2026-04-08T15:50:02.840Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware</loc>
    <lastmod>2026-04-08T15:50:02.907Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phish</loc>
    <lastmod>2026-04-08T15:50:03.310Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-</loc>
    <lastmod>2026-04-08T15:50:02.638Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hackers-abuse-github-to-spy-on-south-korean-firms</loc>
    <lastmod>2026-04-08T15:50:02.571Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/united-states-and-canada-police-tipline-databases-dubbed-blueleaks-2-0-are-alleg</loc>
    <lastmod>2026-04-08T15:50:02.305Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-collection-of-identity-documents-allegedly-totaling-nearly-1tb-is-being-shared</loc>
    <lastmod>2026-04-08T15:50:05.740Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-firm-mercor-confirms-breach-as-hackers-claim-4tb-of-stolen-data</loc>
    <lastmod>2026-04-08T15:48:55.842Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/blast-radius-of-teampcp-attacks-expands-amid-hacker-infighting</loc>
    <lastmod>2026-04-08T15:50:01.951Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-massive-dataset-allegedly-containing-80-million-vietnamese-telephone-lines-and</loc>
    <lastmod>2026-04-08T15:50:05.803Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:50:01.137Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-sharefile-flaws-lead-to-unauthenticated-rce</loc>
    <lastmod>2026-04-08T15:50:04.584Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomware</loc>
    <lastmod>2026-04-08T15:50:06.206Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trueconf-zero-day-exploited-in-asian-government-attacks</loc>
    <lastmod>2026-04-08T15:50:00.659Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/react2shell-exploited-in-large-scale-credential-harvesting-campaign</loc>
    <lastmod>2026-04-08T15:50:04.036Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/man-admits-to-locking-thousands-of-windows-devices-in-extortion-plot</loc>
    <lastmod>2026-04-08T15:50:00.246Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dpr</loc>
    <lastmod>2026-04-08T15:50:02.021Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-im</loc>
    <lastmod>2026-04-08T15:50:00.382Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hackers-drain-285-million-from-drift-in-10-seconds</loc>
    <lastmod>2026-04-08T15:50:00.315Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities</loc>
    <lastmod>2026-04-08T15:49:59.971Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/drift-loses-280-million-north-korean-hackers-seize-security-council-powers</loc>
    <lastmod>2026-04-08T15:50:02.773Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-declares-suspected-chinese-hack-of-us-surveillance-system-a-major-cyber-inci</loc>
    <lastmod>2026-04-08T15:49:42.118Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/faulkner-county-sheriff-s-office-has-been-claimed-a-victim-to-qilin-ransomware-t</loc>
    <lastmod>2026-04-08T15:50:05.870Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerability-patch-roundup-march-2026</loc>
    <lastmod>2026-04-08T15:49:44.210Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uncanny-valley-iran-s-threats-on-us-tech-trump-s-plans-for-midterms-and-polymark</loc>
    <lastmod>2026-04-08T15:49:35.159Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-3775-dll-hijacking-in-foxit-pdf-editor-reader-update-service</loc>
    <lastmod>2026-04-08T15:50:01.633Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-4698-jit-miscompilation-in-firefox-s-javascript-engine-cvss-8-8-affecte</loc>
    <lastmod>2026-04-08T15:50:06.005Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-3775-dll-hijacking-in-foxit-pdf-editor-reader-update-service-https-t-co</loc>
    <lastmod>2026-04-08T15:49:32.245Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-5027-langflow-path-traversal-to-remote-code-execution-poc-cvss-8-8-gith</loc>
    <lastmod>2026-04-08T15:50:04.803Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/upwave-has-allegedly-been-breached-with-its-source-code-leaked-on-a-popular-cybe</loc>
    <lastmod>2026-04-08T15:50:06.071Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-code-leak-used-to-push-infostealer-malware-on-github</loc>
    <lastmod>2026-04-08T15:49:39.353Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials</loc>
    <lastmod>2026-04-08T15:50:03.171Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unit-42-identified-a-campaign-targeting-military-entities-with-nato-diplomatic-a</loc>
    <lastmod>2026-04-08T15:50:05.939Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/drift-loses-280-million-as-hackers-seize-security-council-powers</loc>
    <lastmod>2026-04-08T15:49:24.025Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/how-sentinelone-s-ai-powered-edr-stops-the-axios-npm-supply-chain-attack-autonom</loc>
    <lastmod>2026-04-08T15:50:06.135Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hong-kong-hospital-authority-allegedly-breached-on-a-popular-forum-threat-actor-</loc>
    <lastmod>2026-04-08T15:49:21.745Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-hackers-claim-theft-of-3m-cisco-records-threaten-public-leak</loc>
    <lastmod>2026-04-08T15:49:21.118Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-vulnerability-in-claude-code-emerges-days-after-source-leak</loc>
    <lastmod>2026-04-08T15:49:19.284Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-cyber-threat-evolution-from-mbr-wipers-to-identity-weaponization</loc>
    <lastmod>2026-04-08T15:50:04.933Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-pegasus-like-zero-click-rat-spyware-targeting-android-and-ios-is-being-sold-on</loc>
    <lastmod>2026-04-08T15:49:18.357Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-cyber-ops-shift-less-custom-malware-more-destructive-lotl-they-target-th</loc>
    <lastmod>2026-04-08T15:49:18.439Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-be-selling-unauthorized-administrator-access-to-a-u-s-b</loc>
    <lastmod>2026-04-08T15:49:18.974Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-rolls-out-darksword-exploit-protection-to-more-devices</loc>
    <lastmod>2026-04-08T15:49:17.284Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-bans-all-foreign-made-consumer-routers-schneier-on-security</loc>
    <lastmod>2026-04-08T15:49:16.759Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-leaked-a-1-4tb-private-combolist-containing-url-log-pass-credenti</loc>
    <lastmod>2026-04-08T15:49:10.160Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/akira-ransomware-group-can-achieve-initial-access-to-data-encryption-in-less-tha</loc>
    <lastmod>2026-04-08T15:49:04.550Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-abuse-of-ai-accelerates-from-tool-to-cyberattack-surface</loc>
    <lastmod>2026-04-08T15:48:58.063Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cookie-controlled-php-webshells-a-stealthy-tradecraft-in-linux-hosting-environme</loc>
    <lastmod>2026-04-08T15:49:03.214Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise</loc>
    <lastmod>2026-04-08T15:50:01.347Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hitachi-energy-ellipse</loc>
    <lastmod>2026-04-08T15:48:55.909Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-sicam-8-products</loc>
    <lastmod>2026-04-08T15:48:31.861Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yokogawa-centum-vp</loc>
    <lastmod>2026-04-08T15:48:40.034Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-8</loc>
    <lastmod>2026-04-08T15:48:55.063Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/massive-claim-xtium-formerly-atsg-allegedly-has-data-exposed-on-a-popular-cyberc</loc>
    <lastmod>2026-04-08T15:49:51.968Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/medtech-giant-stryker-says-it-s-back-up-after-iranian-cyberattack</loc>
    <lastmod>2026-04-08T15:49:49.895Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/residential-proxies-evaded-ip-reputation-checks-in-78-of-4b-sessions</loc>
    <lastmod>2026-04-08T15:49:51.025Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime</loc>
    <lastmod>2026-04-08T15:49:51.538Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomware-isn-t-breaking-into-your-network-anymore-it-s-logging-in-adversaries-</loc>
    <lastmod>2026-04-08T15:49:51.164Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/handala-hack-claims-to-be-have-leaked-data-from-psk-wind-technologies-the-compro</loc>
    <lastmod>2026-04-08T15:49:51.239Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-</loc>
    <lastmod>2026-04-08T15:49:50.745Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yurei-ransomware-uses-common-tools-adds-stranger-things-references</loc>
    <lastmod>2026-04-08T15:49:43.569Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-warns-of-whatsapp-attachments-spreading-backdoor-on-windows-pcs</loc>
    <lastmod>2026-04-08T15:49:51.096Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cartagena-city-government-certico-allegedly-has-data-exposed-on-a-popular-cyberc</loc>
    <lastmod>2026-04-08T15:49:50.608Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/one-of-our-researchers-built-an-ai-powered-supply-chain-monitoring-tool-on-a-fri</loc>
    <lastmod>2026-04-08T15:49:50.540Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/medtech-giant-stryker-fully-operational-after-data-wiping-attack</loc>
    <lastmod>2026-04-08T15:49:49.393Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks</loc>
    <lastmod>2026-04-08T15:49:49.679Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/storm-infostealer-sold-as-service-targets-browsers-wallets-and-accounts</loc>
    <lastmod>2026-04-08T15:49:46.653Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bank-trojan-casbaneiro-worms-through-latin-america</loc>
    <lastmod>2026-04-08T15:49:49.746Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-patches-critical-and-high-severity-vulnerabilities</loc>
    <lastmod>2026-04-08T15:49:43.714Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-dfir-report-recently-observed-meowbackconn-again-in-the-wild-initial-access-</loc>
    <lastmod>2026-04-08T15:49:48.704Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cisco-imc-auth-bypass-gives-attackers-admin-access</loc>
    <lastmod>2026-04-08T15:49:40.743Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-m</loc>
    <lastmod>2026-04-08T15:50:12.900Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-face</loc>
    <lastmod>2026-04-08T15:49:48.337Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/250-000-affected-by-data-breach-at-nacogdoches-memorial-hospital</loc>
    <lastmod>2026-04-08T15:49:48.032Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mercor-hit-by-litellm-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:49:47.299Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/possible-us-government-iphone-hacking-tool-leaked-schneier-on-security</loc>
    <lastmod>2026-04-08T15:49:47.589Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/possible-us-government-iphone-hacking-tool-leaked-https-t-co-3yppiw1tq3</loc>
    <lastmod>2026-04-08T15:49:47.441Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-14-000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks</loc>
    <lastmod>2026-04-08T15:49:38.995Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sophisticated-crystalx-rat-emerges</loc>
    <lastmod>2026-04-08T15:49:46.934Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-expands-ios-18-7-7-update-to-more-devices-to-block-darksword-exploit</loc>
    <lastmod>2026-04-08T15:49:46.579Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/industrialization-of-the-fraud-ecosystem-blog</loc>
    <lastmod>2026-04-08T15:49:46.369Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-brief-recruiting-scheme-impersonating-palo-alto-networks-talent-acquisiti</loc>
    <lastmod>2026-04-08T15:49:22.606Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-identified-a-phishing-campaign-targeting-senior-professionals-by-impersonatin</loc>
    <lastmod>2026-04-08T15:49:45.887Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mitigating-the-axios-npm-supply-chain-compromise</loc>
    <lastmod>2026-04-08T15:49:45.425Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-crystalrat-malware-adds-rat-stealer-and-prankware-features</loc>
    <lastmod>2026-04-08T15:49:45.351Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-pushes-rare-ios-18-patch-for-devices-at-risk-from-darksword-exploit</loc>
    <lastmod>2026-04-08T15:49:45.003Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/breaking-on-march-31-2026-a-threat-actor-used-stolen-maintainer-credentials-to-c</loc>
    <lastmod>2026-04-08T15:49:45.069Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/there-is-a-fud-linux-sample-here-http-103-79-79-21-8899-dl-linux-amd64-as-usual-</loc>
    <lastmod>2026-04-08T15:49:45.136Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks</loc>
    <lastmod>2026-04-08T15:50:08.116Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-trueconf-zero-day-to-push-malicious-software-updates</loc>
    <lastmod>2026-04-08T15:49:49.968Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hospital-universitario-del-valle-evaristo-garcia-e-s-e-allegedly-has-data-expose</loc>
    <lastmod>2026-04-08T15:49:44.560Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-11</loc>
    <lastmod>2026-04-08T15:49:52.039Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-windows-ring-0-kernel-micro-implant-is-being-sold-on-a-popular-cybercrime-foru</loc>
    <lastmod>2026-04-08T15:49:44.072Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks</loc>
    <lastmod>2026-04-08T15:49:43.855Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/novoice-android-malware-on-google-play-infected-2-3-million-devices</loc>
    <lastmod>2026-04-08T15:49:43.925Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails</loc>
    <lastmod>2026-04-08T15:49:44.002Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-brief-widespread-impact-of-the-axios-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:49:43.359Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chrome-zero-day-cve-2026-5281-a-use-after-free-in-dawn-x27-s-webgpu-layer</loc>
    <lastmod>2026-04-08T15:49:42.470Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/from-installation-to-compromise-in-15-seconds-learn-the-attack-execution-details</loc>
    <lastmod>2026-04-08T15:49:43.201Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chrome-zero-day-cve-2026-5281-a-use-after-free-in-dawn-s-webgpu-layer-https-t-co</loc>
    <lastmod>2026-04-08T15:49:51.606Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/linkedin-phishing-scam-uses-fake-notifications-to-hijack-accounts</loc>
    <lastmod>2026-04-08T15:49:42.890Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-smarteez-exposes-full-production-database-for-l-x27-oreal-moro</loc>
    <lastmod>2026-04-08T15:49:41.835Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shadowbyt3s-claims-starbucks-breach-with-10gb-of-proprietary-source-code-beverag</loc>
    <lastmod>2026-04-08T15:47:32.005Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/handala-hack-claims-st-joseph-county-breached-with-over-2-terabytes-of-data-alle</loc>
    <lastmod>2026-04-08T15:49:41.181Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-group-shadowbyt3s-claims-breach-of-starbucks-alleging-10gb-of-stolen-sour</loc>
    <lastmod>2026-04-08T15:49:41.257Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/airbus-allegedly-has-artifactory-devops-data-leaked-on-a-popular-cybercrime-foru</loc>
    <lastmod>2026-04-08T15:49:41.613Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-smarteez-exposes-full-production-database-for-l-oreal-morocco-</loc>
    <lastmod>2026-04-08T15:49:41.689Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-built-an-ai-driven-pipeline-to-reverse-engineer-hundreds-of-malware-samples-a</loc>
    <lastmod>2026-04-08T15:49:41.766Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/routine-access-is-powering-modern-intrusions-a-new-threat-report-finds</loc>
    <lastmod>2026-04-08T15:49:40.365Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anthropic-leaks-512-000-lines-of-claude-ai-code-in-major-blunder</loc>
    <lastmod>2026-04-08T15:49:39.579Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/venom-stealer-maas-platform-commoditizes-clickfix-attacks</loc>
    <lastmod>2026-04-08T15:49:39.279Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-deepload-malware-dropped-in-clickfix-attacks</loc>
    <lastmod>2026-04-08T15:49:40.079Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploited-zero-day-among-21-vulnerabilities-patched-in-chrome</loc>
    <lastmod>2026-04-08T15:49:39.649Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulta-intelligence-launches-as-credential-lookup-service-with-14-2-billion-index-2</loc>
    <lastmod>2026-04-08T15:49:41.533Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fulcrumsec-breaches-unique-computing-refocus-ai-and-gennet-ai-exposing-23-000-in-2</loc>
    <lastmod>2026-04-08T15:49:48.419Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-credential-lookup-service-vulta-intelligence-spotted-offers-stolen-login-dat</loc>
    <lastmod>2026-04-08T15:49:39.133Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulta-intelligence-launches-as-credential-lookup-service-with-14-2-billion-index</loc>
    <lastmod>2026-04-08T15:49:39.437Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-fulcrumsec-claims-breach-of-unique-computing-llc-https-t-co-rs6arkd</loc>
    <lastmod>2026-04-08T15:49:39.860Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fulcrumsec-breaches-unique-computing-refocus-ai-and-gennet-ai-exposing-23-000-in</loc>
    <lastmod>2026-04-08T15:49:39.931Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/european-chinese-geopolitical-issues-drive-renewed-cyberespionage-campaign</loc>
    <lastmod>2026-04-08T15:49:39.791Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vect-ransomware-has-partnered-with-teampcp-the-group-behind-the-trivy-checkmarx-</loc>
    <lastmod>2026-04-08T15:49:38.707Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/source-code-and-data-stolen-from-cisco-by-shinyhunters-https-t-co-4ys0zvgxha</loc>
    <lastmod>2026-04-08T15:49:38.779Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/good-work-by-our-teammate-swachchhanda-on-publishing-a-dedicated-sigma-rule-set-</loc>
    <lastmod>2026-04-08T15:49:38.852Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures</loc>
    <lastmod>2026-04-08T15:49:38.216Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypa</loc>
    <lastmod>2026-04-08T15:49:38.143Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released</loc>
    <lastmod>2026-04-08T15:49:38.286Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-charges-uranium-crypto-exchange-hacker</loc>
    <lastmod>2026-04-08T15:49:36.905Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-don-t-s</loc>
    <lastmod>2026-04-08T15:49:37.565Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/imagemagick-zero-day-enables-rce-on-linux-and-wordpress-servers</loc>
    <lastmod>2026-04-08T15:49:37.419Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rb-amsterdam-c-13-783613-kg-za-26-120-3</loc>
    <lastmod>2026-04-08T15:49:37.341Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026</loc>
    <lastmod>2026-04-08T15:49:37.120Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/axios-npm-package-breached-in-north-korean-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:49:36.517Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069</loc>
    <lastmod>2026-04-08T15:49:36.446Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10233396-8</loc>
    <lastmod>2026-04-08T15:49:36.286Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202307472-4</loc>
    <lastmod>2026-04-08T15:49:45.506Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/as-usually-smica83-uploaded-a-related-sample-to-bazaar-https-t-co-jt9hqnoata-act</loc>
    <lastmod>2026-04-08T15:49:36.592Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-drive-ransomware-detection-now-on-by-default-for-paying-users</loc>
    <lastmod>2026-04-08T15:49:22.438Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms</loc>
    <lastmod>2026-04-08T15:49:35.806Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-addresses-vertex-security-issues-after-researchers-weaponize-ai-agents</loc>
    <lastmod>2026-04-08T15:49:35.734Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-laughing-rat-crystalx-combines-spyware-stealer-and-prankware-features</loc>
    <lastmod>2026-04-08T15:49:36.815Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-will-push-out-rare-backported-patches-to-protect-ios-18-users-from-darkswo</loc>
    <lastmod>2026-04-08T15:49:35.510Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-code-source-code-accidentally-leaked-in-npm-package</loc>
    <lastmod>2026-04-08T15:49:34.656Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nissan-gcssd-breach-has-been-claimed-by-everest-ransomware-https-t-co-turfjq6cyr</loc>
    <lastmod>2026-04-08T15:49:34.508Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ongoing-macos-malware-campaign-target-users-searching-for-homebrew-on-mac-with-m</loc>
    <lastmod>2026-04-08T15:49:32.624Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gigabyte-control-center-vulnerable-to-arbitrary-file-write-flaw</loc>
    <lastmod>2026-04-08T15:49:31.702Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-compromised-us-wordpress-e-commerce-shop-with-https-t-co-h8jbx0s5f6-payment-pr</loc>
    <lastmod>2026-04-08T15:49:30.005Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/axios-npm-package-compromised-in-precision-attack</loc>
    <lastmod>2026-04-08T15:49:28.688Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-s-vertex-ai-has-an-over-privileged-problem</loc>
    <lastmod>2026-04-08T15:49:28.776Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-breaches-cloud-saas-instances-with-stolen-credentials</loc>
    <lastmod>2026-04-08T15:49:28.848Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaponizing-the-protectors-teampcp-s-multi-stage-supply-chain-attack-on-security</loc>
    <lastmod>2026-04-08T15:49:29.465Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-threatens-to-start-attacking-major-us-tech-firms-on-april-1</loc>
    <lastmod>2026-04-08T15:49:28.539Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-shared-a-1-3tb-collection-of-url-login-password-credentials-descr</loc>
    <lastmod>2026-04-08T15:49:28.927Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-s-supply-chain-attacks-continue-and-the-group-has-announced-a-partnershi</loc>
    <lastmod>2026-04-08T15:49:29.303Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-database-v2-allegedly-from-https-t-co-1rvccalh97-a-popular-newsletter-and-arti</loc>
    <lastmod>2026-04-08T15:49:28.289Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-ai-finds-vim-emacs-rce-bugs-that-trigger-on-file-open</loc>
    <lastmod>2026-04-08T15:49:28.208Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-massive-breach-allegedly-from-blackline-a-major-financial-automation-platform-</loc>
    <lastmod>2026-04-08T15:49:27.615Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-containing-9-000-loan-records-from-heritagesouth-credit-unio</loc>
    <lastmod>2026-04-08T15:49:27.911Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-possess-a-dataset-containing-personal-and-financial-inf</loc>
    <lastmod>2026-04-08T15:49:27.543Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/how-sentinelone-s-ai-powered-edr-autonomously-discovered-and-stopped-anthropic-s</loc>
    <lastmod>2026-04-08T15:49:26.844Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-containing-10-5-million-users-from-lsgb-a-defunct-german-gam</loc>
    <lastmod>2026-04-08T15:49:27.396Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-3-the-source-code-for-an-infostealer-malware-with-v20-chromium-support-is-bein</loc>
    <lastmod>2026-04-08T15:49:26.525Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-this-isn-t-fake-2-credentials-are-stored-as-hashes-it-should-be-literally-with</loc>
    <lastmod>2026-04-08T15:49:26.607Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/px4-autopilot</loc>
    <lastmod>2026-04-08T15:46:59.198Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anritsu-remote-spectrum-monitor</loc>
    <lastmod>2026-04-08T15:49:25.399Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-deploys-pseudo-ransomware-revives-pay2key-operations</loc>
    <lastmod>2026-04-08T15:49:24.414Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/f5-big-ip-vulnerability-reclassified-as-rce-under-exploitation</loc>
    <lastmod>2026-04-08T15:49:24.560Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attack-on-axios-software-developer-tool-threatens-widespread-compromises</loc>
    <lastmod>2026-04-08T15:49:25.013Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/3-ways-how-to-get-free-gems-in-clash-of-clans834-npm-packa</loc>
    <lastmod>2026-04-08T15:49:24.941Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-dataset-leak-of-canva-exposes-900-000-user-records-with-bcrypt-passwords</loc>
    <lastmod>2026-04-08T15:49:24.347Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-auctioning-wordpress-admin-access-to-spanish-e-commerce-site-with-r-2</loc>
    <lastmod>2026-04-08T15:49:26.159Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-have-discovered-a-massive-supply-chain-compromise-in-the-axios-npm-package-a-</loc>
    <lastmod>2026-04-08T15:49:26.012Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-dataset-leak-of-canva-exposes-900-000-user-records-with-bcrypt-passwords-2</loc>
    <lastmod>2026-04-08T15:49:25.702Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-auctioning-wordpress-admin-access-to-spanish-e-commerce-site-with-r</loc>
    <lastmod>2026-04-08T15:49:25.775Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/genesis-ransomware-claims-8-victims-secure-health-modern-advanced-print-solution</loc>
    <lastmod>2026-04-08T15:49:25.854Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/key-takeaways-a-compromised-npm-maintainer-account-was-used-to-publish-two-malic</loc>
    <lastmod>2026-04-08T15:49:25.928Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-threat-to-critical-infrastructure-has-changed-has-your-readiness</loc>
    <lastmod>2026-04-08T15:49:25.551Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach</loc>
    <lastmod>2026-04-08T15:49:25.320Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks</loc>
    <lastmod>2026-04-08T15:49:24.176Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rb-amsterdam-c-13-783613-kg-za-26-120-2</loc>
    <lastmod>2026-04-08T15:49:22.519Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/stolen-logins-are-fueling-everything-from-ransomware-to-nation-state-cyberattack</loc>
    <lastmod>2026-04-08T15:49:23.691Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/venom-stealer-raises-stakes-with-continuous-credential-harvesting</loc>
    <lastmod>2026-04-08T15:49:22.351Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/elastic-releases-detections-for-the-axios-supply-chain-compromise-elastic-securi</loc>
    <lastmod>2026-04-08T15:49:22.755Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-selling-email-credentials-for-israeli-government-agencies-organizat</loc>
    <lastmod>2026-04-08T15:49:21.899Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-selling-email-credentials-for-israeli-government-agencies-organizat-2</loc>
    <lastmod>2026-04-08T15:49:22.907Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-distributing-a-combolist-containing-9-million-tiktok-credentia</loc>
    <lastmod>2026-04-08T15:49:22.676Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/elasticsecuritylabs-detects-the-axios-npm-supply-chain-attack-across-linux-windo</loc>
    <lastmod>2026-04-08T15:49:22.978Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-massive-breach-allegedly-from-remita-a-major-nigerian-payment-processing-platf</loc>
    <lastmod>2026-04-08T15:49:23.295Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-containing-284-000-unique-users-from-https-t-co-yptxriwjfq-a</loc>
    <lastmod>2026-04-08T15:49:21.518Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/whatsapp-malware-campaign-delivers-vbs-payloads-and-msi-backdoors</loc>
    <lastmod>2026-04-08T15:49:20.206Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware</loc>
    <lastmod>2026-04-08T15:49:19.899Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts</loc>
    <lastmod>2026-04-08T15:49:19.828Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains</loc>
    <lastmod>2026-04-08T15:49:20.055Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-poison-axios-npm-package-with-100-million-weekly-downloads</loc>
    <lastmod>2026-04-08T15:49:20.667Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202305035-2</loc>
    <lastmod>2026-04-08T15:49:21.345Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-moves-from-oss-to-aws-environments</loc>
    <lastmod>2026-04-08T15:49:20.437Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/crewai-vulnerabilities-expose-devices-to-hacking</loc>
    <lastmod>2026-04-08T15:49:20.507Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/supply-chain-issue-in-axios-on-npm-the-malicious-versions-1-14-1-and-0-30-4-pull</loc>
    <lastmod>2026-04-08T15:49:18.595Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-f5-big-ip-flaw-upgraded-to-9-8-rce-exploited-in-the-wild</loc>
    <lastmod>2026-04-08T15:49:18.674Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202307472</loc>
    <lastmod>2026-04-08T15:49:17.690Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/strongswan-flaw-allows-unauthenticated-attackers-to-crash-vpns</loc>
    <lastmod>2026-04-08T15:49:17.840Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-slashes-quantum-resource-requirements-for-breaking-cryptocurrency-encrypt</loc>
    <lastmod>2026-04-08T15:49:17.602Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploitation-of-critical-fortinet-forticlient-ems-flaw-begins</loc>
    <lastmod>2026-04-08T15:49:17.759Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange</loc>
    <lastmod>2026-04-08T15:49:16.362Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rb-amsterdam-c-13-783613-kg-za-26-120</loc>
    <lastmod>2026-04-08T15:49:17.134Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202305035</loc>
    <lastmod>2026-04-08T15:49:16.908Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dutch-finance-ministry-takes-treasury-banking-portal-offline-after-breach</loc>
    <lastmod>2026-04-08T15:48:53.580Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-actively-exploited-citrix-flaw-by-thursday</loc>
    <lastmod>2026-04-08T15:49:28.059Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account</loc>
    <lastmod>2026-04-08T15:49:27.840Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-vulnerability-in-openai-codex-allowed-github-token-compromise</loc>
    <lastmod>2026-04-08T15:49:13.932Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-is-ransoming-hallmark-cards-those-fucking-shitty-birthday-cards-you</loc>
    <lastmod>2026-04-08T15:48:38.271Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-leaked-a-combolist-containing-128-398-credentials-from-mixed-educ</loc>
    <lastmod>2026-04-08T15:48:20.733Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/play-ransomware-claims-10-victims-witt-uk-group-valley-plating-inc-ampex-data</loc>
    <lastmod>2026-04-08T15:49:16.290Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/f5-big-ip-vulnerability-reclassified-as-rce-under-exploitation-2</loc>
    <lastmod>2026-04-08T15:49:26.765Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-powered-deepload-malware-steals-credentials-evades-detection</loc>
    <lastmod>2026-04-08T15:49:05.635Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/healthcare-tech-firm-carecloud-says-hackers-stole-patient-data</loc>
    <lastmod>2026-04-08T15:49:07.793Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks</loc>
    <lastmod>2026-04-08T15:49:08.230Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/openai-codex-vulnerability-allowed-attackers-to-steal-github-tokens</loc>
    <lastmod>2026-04-08T15:49:03.968Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-distributing-a-combolist-containing-7-million-credential-pairs</loc>
    <lastmod>2026-04-08T15:49:02.260Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kimwolf-v7-the-updated-iot-botnet-behind-record-ddos-attacks-adds-http-2-floods-</loc>
    <lastmod>2026-04-08T15:49:03.589Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-say-credential-stealing-campaign-used-ai-to-build-evasion-at-every-s</loc>
    <lastmod>2026-04-08T15:48:58.764Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-hacktivist-group-called-nasir-resistance-claims-to-have-breached-dubai-interna</loc>
    <lastmod>2026-04-08T15:48:55.131Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-containing-689-891-unique-member-records-from-the-federation</loc>
    <lastmod>2026-04-08T15:48:57.476Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks</loc>
    <lastmod>2026-04-08T15:49:57.158Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerabili</loc>
    <lastmod>2026-04-08T15:48:55.755Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-10</loc>
    <lastmod>2026-04-08T15:49:23.866Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-claims-7-9m-salesforce-records-from-hallmark-https-t-co-wlhw1rbbbc</loc>
    <lastmod>2026-04-08T15:46:55.391Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lapsus-group-is-allegedly-selling-a-massive-dataset-of-https-t-co-q6uld72i8v-an-</loc>
    <lastmod>2026-04-08T15:48:28.603Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lapsus-group-is-allegedly-selling-a-massive-dataset-of-https-t-co-q6uld72py3-an-</loc>
    <lastmod>2026-04-08T15:48:43.391Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials</loc>
    <lastmod>2026-04-08T15:49:10.858Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/15-year-old-strongswan-flaw-lets-attackers-crash-vpns-via-integer-underflow</loc>
    <lastmod>2026-04-08T15:49:10.715Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/storm-brews-over-critical-no-click-telegram-flaw</loc>
    <lastmod>2026-04-08T15:49:13.783Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cat-s-got-your-files-lynx-ransomware-the-dfir-report</loc>
    <lastmod>2026-04-08T15:49:13.706Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-cybercrime-tool-called-netscan-is-being-advertised-on-a-popular-cybercrime-for</loc>
    <lastmod>2026-04-08T15:49:11.001Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rdp-bitmap-cache-artifacts-revealed-the-threat-actor-opening-the-veeam-backup-am</loc>
    <lastmod>2026-04-08T15:49:13.253Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/noobsaibot-hvnc-advertised-as-next-generation-stealer-and-rat-with-zero-disk-foo-2</loc>
    <lastmod>2026-04-08T15:49:21.266Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-have-breached-the-dataset-from-army</loc>
    <lastmod>2026-04-08T15:49:07.032Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/noobsaibot-hvnc-advertised-as-next-generation-stealer-and-rat-with-zero-disk-foo</loc>
    <lastmod>2026-04-08T15:49:07.725Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-from-https-t-co-n8qm5i30x2-a-website-focused-on-lake-conditi</loc>
    <lastmod>2026-04-08T15:49:08.153Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-adds-macos-terminal-warning-to-block-clickfix-attacks</loc>
    <lastmod>2026-04-08T15:49:03.523Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-an</loc>
    <lastmod>2026-04-08T15:49:47.796Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10233396-10</loc>
    <lastmod>2026-04-08T15:49:58.208Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silent-drift-how-llms-are-quietly-breaking-organizational-access-control</loc>
    <lastmod>2026-04-08T15:49:01.726Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-containing-5-000-profiles-from-an-australian-mortgage-compan</loc>
    <lastmod>2026-04-08T15:49:00.353Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-from-regio-ruta-a-public-transit-platform-in-monterrey-nuevo</loc>
    <lastmod>2026-04-08T15:49:00.136Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dark-web-market-lists-alleged-375tb-lockheed-martin-data-for-600m</loc>
    <lastmod>2026-04-08T15:49:56.863Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerability-affecting-f5-big-ip-apm</loc>
    <lastmod>2026-04-08T15:48:43.607Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ncsc-is-encouraging-uk-organisations-to-take-immediate-action-to-mitigate-a-</loc>
    <lastmod>2026-04-08T15:48:51.572Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now</loc>
    <lastmod>2026-04-08T15:49:01.877Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos</loc>
    <lastmod>2026-04-08T15:48:51.059Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunne</loc>
    <lastmod>2026-04-08T15:48:51.130Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-uses-fake-ringtone-file-in-tainted-telnyx-sdk-to-steal-credentials</loc>
    <lastmod>2026-04-08T15:49:57.783Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/european-commission-reports-cyber-intrusion-and-data-theft</loc>
    <lastmod>2026-04-08T15:48:40.895Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hacked-hospitals-hidden-spyware-iran-conflict-shows-how-digital-fight-is-ingrain</loc>
    <lastmod>2026-04-08T15:49:57.995Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/telnyx-targeted-in-growing-teampcp-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:49:58.495Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-apt-star-blizzard-adopts-darksword-ios-exploit-kit</loc>
    <lastmod>2026-04-08T15:49:58.783Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-confirms-kash-patel-email-hack-as-us-offers-10m-reward-for-hackers</loc>
    <lastmod>2026-04-08T15:49:15.743Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploitation-of-fresh-citrix-netscaler-vulnerability-begins</loc>
    <lastmod>2026-04-08T15:49:15.590Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks</loc>
    <lastmod>2026-04-08T15:49:14.842Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/european-commission-confirms-data-breach-after-europa-eu-hack</loc>
    <lastmod>2026-04-08T15:49:14.914Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-camp</loc>
    <lastmod>2026-04-08T15:49:03.673Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild</loc>
    <lastmod>2026-04-08T15:49:14.989Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-confirms-hack-of-director-patel-s-personal-email-inbox</loc>
    <lastmod>2026-04-08T15:49:14.607Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-be-selling-mailpro-an-email-campaign-management-panel-f</loc>
    <lastmod>2026-04-08T15:49:14.540Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/doctor-com-has-a-serious-infostealer-problem-they-also-just-got-claimed-by-qilin</loc>
    <lastmod>2026-04-08T15:48:38.455Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-claiming-to-contain-israeli-citizen-records-is-allegedly-being-sold-on</loc>
    <lastmod>2026-04-08T15:49:14.235Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-of-https-t-co-dko9otxsz6-a-spanish-footwear-brand-based-in-arnedo-la-r</loc>
    <lastmod>2026-04-08T15:49:14.307Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-originating-from-https-t-co-yafa8cnu0i-a-saudi-arabian-e-com</loc>
    <lastmod>2026-04-08T15:49:13.635Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-security-researcher-at-the-zero-day-initiative-claims-to-have-found-a-zero-day</loc>
    <lastmod>2026-04-08T15:49:13.484Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites</loc>
    <lastmod>2026-04-08T15:49:13.328Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-claims-350gb-data-breach-at-european-commission</loc>
    <lastmod>2026-04-08T15:49:12.354Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/i-decompiled-the-white-house-x27-s-new-app</loc>
    <lastmod>2026-04-08T15:49:12.119Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-linked-hackers-breach-fbi-director-s-personal-email-hit-stryker-with-wiper-</loc>
    <lastmod>2026-04-08T15:49:12.951Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-spanish-electricity-company-fenie-energia-has-allegedly-been-completely-hack</loc>
    <lastmod>2026-04-08T15:49:11.372Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/beammp-a-popular-mod-for-beamng-drive-was-compromised-internet-nerds-are-investi</loc>
    <lastmod>2026-04-08T15:49:11.215Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/european-commission-europa-eu-has-had-350-gb-of-data-leaked-by-shinyhunters-http</loc>
    <lastmod>2026-04-08T15:49:10.478Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lloyds-group-to-compensate-450-000-customers-after-app-glitch</loc>
    <lastmod>2026-04-08T15:49:10.074Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures</loc>
    <lastmod>2026-04-08T15:49:10.324Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-b</loc>
    <lastmod>2026-04-08T15:49:12.657Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cloudflare-themed-clickfix-attack-drops-infiniti-stealer-on-macs</loc>
    <lastmod>2026-04-08T15:49:10.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign</loc>
    <lastmod>2026-04-08T15:49:09.787Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation</loc>
    <lastmod>2026-04-08T15:49:12.804Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/i-believe-mr-moyal-has-successfully-reconstructed-how-handala-compromised-kash-p</loc>
    <lastmod>2026-04-08T15:49:09.562Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-linked-handala-hackers-breach-fbi-chief-kash-patel-s-gmail</loc>
    <lastmod>2026-04-08T15:49:08.013Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/package-2-of-the-superintendencia-nacional-de-salud-de-colombia-supersalud-breac</loc>
    <lastmod>2026-04-08T15:49:09.256Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-of-lyca-mobile-a-french-mobile-operator-has-allegedly-been-leaked-on-a</loc>
    <lastmod>2026-04-08T15:49:06.230Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-database-of-syma-mobile-a-french-mobile-operator-has-allegedly-been-leaked-o</loc>
    <lastmod>2026-04-08T15:49:09.495Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/access-to-the-peru-branch-of-oxxo-the-convenience-store-chain-with-an-annual-rev</loc>
    <lastmod>2026-04-08T15:49:05.782Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-european-commission-announced-earlier-today-that-it-was-breached-a-hacker-is</loc>
    <lastmod>2026-04-08T15:49:09.109Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio</loc>
    <lastmod>2026-04-08T15:49:07.938Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-march-27th-2026</loc>
    <lastmod>2026-04-08T15:49:07.508Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-walk-away-from-breachforums-leak-300-000-user-database</loc>
    <lastmod>2026-04-08T15:49:06.965Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-bad-malware-via-fake-cvs-faux-elevate-a-new-phishing-campaign-is-targeting-f</loc>
    <lastmod>2026-04-08T15:49:04.033Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/7-years-for-a-9m-ransomware-broker-malware-laden-resumes-and-a-global-hijack-of-</loc>
    <lastmod>2026-04-08T15:49:04.109Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ugly-supply-chain-compromise-teampcp-multi-stage-attack-this-week-attackers-</loc>
    <lastmod>2026-04-08T15:49:08.377Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-9</loc>
    <lastmod>2026-04-08T15:49:03.426Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-new-android-remote-administration-tool-rat-called-darkweb-is-being-sold-on-a-p</loc>
    <lastmod>2026-04-08T15:49:02.850Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/internal-data-from-the-police-nationale-gitlab</loc>
    <lastmod>2026-04-08T15:49:02.925Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gt-be-iranian-threat-actors-gt-compromise-fbi-directors-personal-email-gt-fast-f</loc>
    <lastmod>2026-04-08T15:49:03.280Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-hackers-breached-kash-patel-s-email-but-not-the-fbi-s</loc>
    <lastmod>2026-04-08T15:49:02.782Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sheraton-hotels-and-resorts-the-american-international-hotel-chain-owned-by-marr</loc>
    <lastmod>2026-04-08T15:49:02.636Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-moves-q-day-estimate-to-2029-industry-experts-say-the-clock-is-already-ti</loc>
    <lastmod>2026-04-08T15:49:02.112Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-citrix-netscaler-flaw-draws-citrixbleed-comparisons-as-exploitation-win</loc>
    <lastmod>2026-04-08T15:49:02.192Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/coruna-darksword-amp-democratizing-nation-state-exploit-kits</loc>
    <lastmod>2026-04-08T15:49:00.662Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploit</loc>
    <lastmod>2026-04-08T15:49:00.500Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files</loc>
    <lastmod>2026-04-08T15:49:00.571Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-sets-2029-deadline-as-quantum-computers-threaten-encryption</loc>
    <lastmod>2026-04-08T15:49:01.090Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/under-ctrl-dissecting-a-previously-undocumented-russian-net-access-framework-cen</loc>
    <lastmod>2026-04-08T15:49:00.994Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/just-seen-censysio-published-this-article-today-https-t-co-ejit3pfxbk-in-the-int</loc>
    <lastmod>2026-04-08T15:49:01.417Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/access-to-over-30-claro-cloud-user-websites-is-allegedly-being-offered-on-a-popu</loc>
    <lastmod>2026-04-08T15:49:01.488Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-hackers-handala-claim-to-compromise-fbi-director-kash-patel-s-personal-d</loc>
    <lastmod>2026-04-08T15:49:01.204Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/security-leaders-say-the-next-two-years-are-going-to-be-insane</loc>
    <lastmod>2026-04-08T15:49:01.315Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-high-ranking-forum-moderator-is-publicly-seeking-to-buy-any-data-or-access-fro</loc>
    <lastmod>2026-04-08T15:48:59.988Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-has-done-another-supply-chain-attack-my-brother-in-christ-how-many-of-th</loc>
    <lastmod>2026-04-08T15:48:59.911Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/source-code-from-multiple-uae-websites-has-allegedly-been-leaked-on-a-popular-cy</loc>
    <lastmod>2026-04-08T15:49:00.069Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/wartime-usage-of-compromised-ip-cameras-highlight-their-danger</loc>
    <lastmod>2026-04-08T15:48:59.333Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-upgrades-the-backdoor-it-uses-to-spy-on-telcos-globally</loc>
    <lastmod>2026-04-08T15:48:59.258Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bianlian-ransomware-spreads-via-fake-invoice-svg-images-in-new-attacks</loc>
    <lastmod>2026-04-08T15:48:58.620Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/snowteam-launches-leak-bazaar-a-corporate-data-exchange-with-ml-powered-dump-ana</loc>
    <lastmod>2026-04-08T15:48:58.903Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-database-allegedly-containing-318-000-user-records-from-https-t-co-jk4vqizmp5-</loc>
    <lastmod>2026-04-08T15:48:59.039Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-mexico-dataset-of-c-amp-a-modas-the-international-fashion-retailer-has-alleg</loc>
    <lastmod>2026-04-08T15:48:58.408Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/snowteam-launches-leak-bazaar-a-corporate-data-exchange-with-ml-powered-dump-ana-2</loc>
    <lastmod>2026-04-08T15:48:59.108Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patel-s-pe</loc>
    <lastmod>2026-04-08T15:48:58.968Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/european-commission-investigating-breach-after-amazon-cloud-account-hack</loc>
    <lastmod>2026-04-08T15:48:58.831Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-vs-code-alerts-on-github-spread-malware-to-developers</loc>
    <lastmod>2026-04-08T15:48:58.687Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-group-shadowbyt3-claims-to-have-breached-the-university-of-georgia-stealing-</loc>
    <lastmod>2026-04-08T15:48:57.838Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-massive-breach-of-the-superintendencia-nacional-de-salud-de-colombia-supersalu</loc>
    <lastmod>2026-04-08T15:48:57.545Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/today-handala-a-suspected-iranian-based-threat-actor-group-successfully-compromi</loc>
    <lastmod>2026-04-08T15:48:57.691Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-3-handala-hack-the-hacktivist-group-behind-the-data-leak-of-senior-engineers-a</loc>
    <lastmod>2026-04-08T15:48:57.016Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/reuters-has-confirmed-fbi-director-kash-patel-s-email-was-indeed-hacked-https-t-</loc>
    <lastmod>2026-04-08T15:48:56.349Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-teampcp-campaign-continues-the-telnyx-pypi-package-versions-4-87-1-amp-4-87-</loc>
    <lastmod>2026-04-08T15:48:56.713Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks</loc>
    <lastmod>2026-04-08T15:48:55.986Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-are-at-war</loc>
    <lastmod>2026-04-08T15:48:55.613Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tp-link-patches-high-severity-router-vulnerabilities</loc>
    <lastmod>2026-04-08T15:48:55.292Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/european-commission-investigating-breach-after-amazon-cloud-hack</loc>
    <lastmod>2026-04-08T15:49:59.837Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-sets-2029-deadline-for-quantum-safe-cryptography</loc>
    <lastmod>2026-04-08T15:48:54.470Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bearlyfy-hits-70-russian-firms-with-custom-genielocker-ransomware</loc>
    <lastmod>2026-04-08T15:48:54.628Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anspdcp-romania-fine-against-renault-commercial-roumanie-srl</loc>
    <lastmod>2026-04-08T15:49:56.128Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized</loc>
    <lastmod>2026-04-08T15:48:54.384Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/coruna-ios-exploit-kit-likely-an-update-to-operation-triangulation</loc>
    <lastmod>2026-04-08T15:49:59.695Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frame</loc>
    <lastmod>2026-04-08T15:48:54.165Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gt-shinyhunters-has-leaked-breachforums-v5-database-version-five-https-t-co-qgm4</loc>
    <lastmod>2026-04-08T15:48:53.942Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/web-shells-types-mitigation-removal</loc>
    <lastmod>2026-04-08T15:49:58.928Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ghost-campaign-uses-fake-npm-progress-bars-to-phish-sudo-passwords</loc>
    <lastmod>2026-04-08T15:49:58.137Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/this-sql-file-called-breachforums-version-5-has-the-following-rows-keep-in-mind-</loc>
    <lastmod>2026-04-08T15:48:53.653Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-leaks-breachforums-version-5-they-say-the-following-of-the-leak-bre</loc>
    <lastmod>2026-04-08T15:48:53.733Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/for-the-skeptics-handala-is-very-capable-of-doing-what-they-claim-lockheed-marti</loc>
    <lastmod>2026-04-08T15:48:53.357Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-march-26th-2026</loc>
    <lastmod>2026-04-08T15:48:53.799Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-database-of-banco-agropecuario-peru-has-allegedly-been-leaked-on-a-popular-c-2</loc>
    <lastmod>2026-04-08T15:48:53.292Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-database-of-procamps-a-u-s-based-sports-event-management-and-marketing-compa</loc>
    <lastmod>2026-04-08T15:48:53.067Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-database-of-banco-agropecuario-peru-has-allegedly-been-leaked-on-a-popular-c</loc>
    <lastmod>2026-04-08T15:48:53.143Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-substantial-update-to-our-threat-brief-on-iran-cyber-activity-spotlights-confl</loc>
    <lastmod>2026-04-08T15:48:53.219Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-flaw-in-langflow-ai-platform-under-attack</loc>
    <lastmod>2026-04-08T15:48:52.556Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-hexvior-is-allegedly-selling-1-000-usa-personal-identity-records-co</loc>
    <lastmod>2026-04-08T15:48:51.959Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows</loc>
    <lastmod>2026-04-08T15:48:59.618Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/internal-and-confidential-documents-from-nu-bank-via-emergiacc-conalcreditos-col</loc>
    <lastmod>2026-04-08T15:48:52.117Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firewall-access-to-an-asian-oil-company-based-in-laos-with-an-estimated-revenue-</loc>
    <lastmod>2026-04-08T15:48:52.268Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-netwo</loc>
    <lastmod>2026-04-08T15:48:52.998Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dataset-allegedly-containing-2-3-million-unique-user-records-from-https-t-co-v</loc>
    <lastmod>2026-04-08T15:48:52.041Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-7</loc>
    <lastmod>2026-04-08T15:48:51.724Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/handala-hack-the-hacktivist-group-behind-the-mass-data-intune-wipe-of-the-compan</loc>
    <lastmod>2026-04-08T15:48:28.910Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/quish-splash-qr-code-phishing-campaign-hits-1-6-million-users</loc>
    <lastmod>2026-04-08T15:49:55.428Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-data-leak-of-rouzbeh-educational-complex-exposes-202-383-records-includi</loc>
    <lastmod>2026-04-08T15:48:50.398Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-utility-tool-called-logs-guru-v1-4-is-being-advertised-on-a-popular-cybercrime</loc>
    <lastmod>2026-04-08T15:48:28.522Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/wago-gmbh-co-kg-industrial-managed-switches</loc>
    <lastmod>2026-04-08T15:48:50.544Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/opencode-systems-oc-messaging-and-ussd-gateway</loc>
    <lastmod>2026-04-08T15:48:50.691Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ptc-windchill-product-lifecycle-management</loc>
    <lastmod>2026-04-08T15:48:56.928Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uk-sanctions-xinbi-marketplace-linked-to-asian-scam-centers</loc>
    <lastmod>2026-04-08T15:49:59.762Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-20-billion-crypto-scam-market-faces-a-new-government-crackdown</loc>
    <lastmod>2026-04-08T15:48:50.475Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/personal-data-of-447-445-members-of-the-federation-francaise-de-voile-french-sai</loc>
    <lastmod>2026-04-08T15:48:30.076Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-claims-to-be-sharing-u-s-air-force-air-mobi</loc>
    <lastmod>2026-04-08T15:48:28.749Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/leakbase-admin-chucky-was-arrested-for-those-unfamiliar-leakbase-was-this-big-as</loc>
    <lastmod>2026-04-08T15:48:30.144Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-selling-spanish-iban-banking-data-contai</loc>
    <lastmod>2026-04-08T15:48:32.016Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-selling-a-massive-data-package-from-bmw-</loc>
    <lastmod>2026-04-08T15:48:33.132Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tiktok-for-business-accounts-targeted-in-new-phishing-campaign</loc>
    <lastmod>2026-04-08T15:49:08.675Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/coruna-ios-exploit-framework-linked-to-triangulation-attacks</loc>
    <lastmod>2026-04-08T15:49:57.852Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website</loc>
    <lastmod>2026-04-08T15:48:48.370Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception</loc>
    <lastmod>2026-04-08T15:48:40.961Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more</loc>
    <lastmod>2026-04-08T15:48:49.488Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-breachforums-clone-clearnet-breachforums-sb-dark-web-https-breachddyfwvcp4kz</loc>
    <lastmod>2026-04-08T15:48:39.020Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interlock-ransomware-has-listed-goodwill-industries-of-north-central-pennsylvani</loc>
    <lastmod>2026-04-08T15:48:46.705Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-the-hacktivist-group-handala-hack-has-followed-through-on-their-earlier-thre</loc>
    <lastmod>2026-04-08T15:48:47.095Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-pxa-stealer-malware-targets-banks-uses-telegram-to-exfiltrate-data</loc>
    <lastmod>2026-04-08T15:49:59.480Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bind-updates-patch-high-severity-vulnerabilities</loc>
    <lastmod>2026-04-08T15:49:58.066Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-patches-multiple-vulnerabilities-in-ios-software</loc>
    <lastmod>2026-04-08T15:49:56.651Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-hackers-caught-deep-within-telecom-backbone-infrastructure</loc>
    <lastmod>2026-04-08T15:49:56.581Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russia-arrests-suspected-owner-of-leakbase-cybercrime-forum</loc>
    <lastmod>2026-04-08T15:48:31.944Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/suspected-redline-infostealer-malware-admin-extradited-to-us</loc>
    <lastmod>2026-04-08T15:49:58.288Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/intermediaries-driving-global-spyware-market-expansion</loc>
    <lastmod>2026-04-08T15:48:30.445Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks</loc>
    <lastmod>2026-04-08T15:48:29.993Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/suspected-hijacked-developer-accounts-spread-npm-malware</loc>
    <lastmod>2026-04-08T15:49:56.279Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/an-ai-gateway-designed-to-steal-your-data</loc>
    <lastmod>2026-04-08T15:48:35.478Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-redline-malware-administrator-extradited-to-us</loc>
    <lastmod>2026-04-08T15:49:59.201Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/webrtc-skimmer-bypasses-csp-to-steal-payment-data-from-e-commerce-sites</loc>
    <lastmod>2026-04-08T15:48:47.020Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/coruna-the-framework-used-in-operation-triangulation</loc>
    <lastmod>2026-04-08T15:48:47.538Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-selling-the-https-t-co-ldujdeanev-crypto</loc>
    <lastmod>2026-04-08T15:48:40.751Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/polyshell-attacks-target-56-of-all-vulnerable-magento-stores</loc>
    <lastmod>2026-04-08T15:49:57.647Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-moves-post-quantum-encryption-timeline-up-to-2029</loc>
    <lastmod>2026-04-08T15:48:37.635Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-redline-infostealer-conspirator-extradited-to-us</loc>
    <lastmod>2026-04-08T15:49:58.997Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mirai-malware-evolves-into-hundreds-of-variants-driving-botnet-growth</loc>
    <lastmod>2026-04-08T15:49:57.920Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-has-leaked-the-full-database-of-altatech-a-</loc>
    <lastmod>2026-04-08T15:48:32.910Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-breachforums-domain-registration-breachforums-bb-31-3-65-15-https-t-co-peqh0</loc>
    <lastmod>2026-04-08T15:48:50.772Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bubble-ai-app-builder-abused-to-steal-microsoft-account-credentials</loc>
    <lastmod>2026-04-08T15:49:57.228Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-national-and-two-u-s-citizens-charged-with-conspiring-to-smuggle-artific-2</loc>
    <lastmod>2026-04-08T15:48:51.429Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-has-added-1-vulnerability-to-the-kev-catalog-cve-2026-33017-langflow-code-i</loc>
    <lastmod>2026-04-08T15:48:51.354Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-national-and-two-u-s-citizens-charged-with-conspiring-to-smuggle-artific</loc>
    <lastmod>2026-04-08T15:48:30.373Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-6</loc>
    <lastmod>2026-04-08T15:48:43.535Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets</loc>
    <lastmod>2026-04-08T15:49:56.053Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-hacktivist-group-handala-hack-has-posted-a-threatening-message-on-their-tele</loc>
    <lastmod>2026-04-08T15:48:28.136Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/leakbase-admin-arrested-in-russia-over-massive-stolen-credential-marketplace</loc>
    <lastmod>2026-04-08T15:48:27.782Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-bans-new-foreign-made-home-routers-over-national-security-fears</loc>
    <lastmod>2026-04-08T15:49:53.511Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerabilities-affecting-citrix-netscaler-adc-and-citrix-netscaler-gateway</loc>
    <lastmod>2026-04-08T15:48:42.401Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russia-arrests-alleged-owner-of-cybercrime-forum-leakbase-report-says-techcrunch</loc>
    <lastmod>2026-04-08T15:47:29.334Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-advertising-430k-dumped-records-and-full</loc>
    <lastmod>2026-04-08T15:47:21.225Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ncsc-is-encouraging-uk-organisations-to-take-immediate-action-to-mitigate-tw</loc>
    <lastmod>2026-04-08T15:48:28.448Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/footage-of-the-leakbase-domain-administrator-getting-arrested-in-taganrog-russia</loc>
    <lastmod>2026-04-08T15:47:14.347Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/authorities-in-russia-have-taken-into-custody-a-suspect-believed-to-be-the-found</loc>
    <lastmod>2026-04-08T15:47:14.682Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gt-threat-actors-gt-big-mean-nerds-gt-perform-massive-supply-chain-attack-gt-inf</loc>
    <lastmod>2026-04-08T15:47:29.054Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-alyna-exposes-18-000-users-with-passwords-gps-coordinates-and--2</loc>
    <lastmod>2026-04-08T15:48:49.041Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-has-leaked-the-database-of-https-t-co-drflt</loc>
    <lastmod>2026-04-08T15:48:48.667Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/security-for-the-quantum-era-implementing-post-quantum-cryptography-in-android</loc>
    <lastmod>2026-04-08T15:48:49.185Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible</loc>
    <lastmod>2026-04-08T15:48:28.208Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-selling-600-panamanian-national-id-dni-p</loc>
    <lastmod>2026-04-08T15:48:47.720Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-re-seeing-a-missing-font-clickfix-chain-in-the-wild-flow-1-fake-missing-font-</loc>
    <lastmod>2026-04-08T15:48:48.050Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-auctioning-shell-access-to-a-palestinian</loc>
    <lastmod>2026-04-08T15:48:47.310Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-auctioning-colombian-driver-s-license-do</loc>
    <lastmod>2026-04-08T15:48:47.391Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-post-on-a-popular-cybercrime-forum-is-advertising-united-states-canada-police-</loc>
    <lastmod>2026-04-08T15:48:47.808Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-litellm-supply-chain-attack-is-big-shenanigans-i-have-to-explain-the-whole-t</loc>
    <lastmod>2026-04-08T15:48:48.115Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-speeds-attacks-but-identity-remains-cybersecurity-s-weakest-link</loc>
    <lastmod>2026-04-08T15:48:45.613Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ios-macos-26-4-roll-out-with-fresh-security-patches</loc>
    <lastmod>2026-04-08T15:48:46.956Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-cybercriminal-gets-2-year-prison-sentence-in-us</loc>
    <lastmod>2026-04-08T15:49:57.091Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/paid-ai-accounts-are-now-a-hot-underground-commodity</loc>
    <lastmod>2026-04-08T15:49:59.626Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-satellite-data-becomes-a-weapon</loc>
    <lastmod>2026-04-08T15:48:45.839Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto</loc>
    <lastmod>2026-04-08T15:48:45.757Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anatomy-of-a-cyber-world-global-report-2026</loc>
    <lastmod>2026-04-08T15:48:44.793Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fcc-bans-new-routers-made-outside-the-us-over-national-security-risks</loc>
    <lastmod>2026-04-08T15:49:20.966Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi</loc>
    <lastmod>2026-04-08T15:49:57.713Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw</loc>
    <lastmod>2026-04-08T15:48:22.891Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth</loc>
    <lastmod>2026-04-08T15:48:43.897Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat</loc>
    <lastmod>2026-04-08T15:48:44.573Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks</loc>
    <lastmod>2026-04-08T15:50:02.160Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-openclaw-token-giveaway-targets-github-devs-with-wallet-draining-scam</loc>
    <lastmod>2026-04-08T15:49:56.508Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10230206-3</loc>
    <lastmod>2026-04-08T15:49:57.510Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-prisons-russian-access-broker-for-aiding-ransomware-attacks</loc>
    <lastmod>2026-04-08T15:48:42.787Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mssqland-lightweight-ms-sql-interaction-tool-for-lateral-movement-and-post-explo</loc>
    <lastmod>2026-04-08T15:49:59.550Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-hits-trivy-checkmarx-and-litellm-in-credential-theft-campaign</loc>
    <lastmod>2026-04-08T15:49:59.135Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ico-uk-reddit-inc-2</loc>
    <lastmod>2026-04-08T15:49:58.426Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns</loc>
    <lastmod>2026-04-08T15:48:42.039Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/that-sample-was-seen-still-available-from-https-official-teams-storage-com-files</loc>
    <lastmod>2026-04-08T15:48:41.620Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/guidance-for-detecting-investigating-and-defending-against-the-trivy-supply-chai</loc>
    <lastmod>2026-04-08T15:49:59.406Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-authenticator-the-hidden-mechanisms-of-passwordless-authentication</loc>
    <lastmod>2026-04-08T15:48:41.104Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-linked-ransomware-gang-targeted-us-healthcare-org-amid-military-conflict</loc>
    <lastmod>2026-04-08T15:48:41.329Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-ransomware-group-pay2key-is-back-targeting-a-us-health-organization-in-l</loc>
    <lastmod>2026-04-08T15:48:41.036Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug</loc>
    <lastmod>2026-04-08T15:49:56.433Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chat-i-ll-tell-you-one-thing-right-now-this-litellm-supply-chain-attack-is-one-b</loc>
    <lastmod>2026-04-08T15:48:40.247Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/darksword-s-github-leak-threatens-to-turn-elite-iphone-hacking-into-a-tool-for-t</loc>
    <lastmod>2026-04-08T15:49:59.068Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/plot-twist-the-bf-actor-taking-claim-to-breaching-ovhcloud-is-now-saying-that-an</loc>
    <lastmod>2026-04-08T15:48:40.181Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-hacker-gets-nearly-7-years-in-federal-prison-for-enabling-ransomware-att</loc>
    <lastmod>2026-04-08T15:48:40.103Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:49:56.796Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-kics-code-scanner-targeted-in-widening-supply-chain-hit</loc>
    <lastmod>2026-04-08T15:48:39.300Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackerone-mazda-infinite-campus-and-dutch-ministry-hit-by-data-breaches</loc>
    <lastmod>2026-04-08T15:48:40.320Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-using-the-handle-hexvior-has-leaked-a-massive-telegram-user-datab</loc>
    <lastmod>2026-04-08T15:48:39.672Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gt-be-me-gt-crash-out-over-litellm-supply-chain-attack-gt-get-dm-gt-look-inside-</loc>
    <lastmod>2026-04-08T15:48:39.749Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fcc-bans-new-routers-made-outside-the-usa-over-security-risks</loc>
    <lastmod>2026-04-08T15:49:57.443Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-backdoors-litellm-versions-1-82-7-1-82-8-likely-via-trivy-ci-cd-compromi</loc>
    <lastmod>2026-04-08T15:48:39.893Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-using-the-handle-wallace-shawn-is-advertising-physical-cloned-jco</loc>
    <lastmod>2026-04-08T15:48:39.162Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/whoa-whoa-whoa-everyone-clam-down-for-a-second-earlier-today-someone-broke-the-n</loc>
    <lastmod>2026-04-08T15:48:39.227Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/experts-warn-of-a-loud-and-aggressive-extortion-wave-following-trivy-hack</loc>
    <lastmod>2026-04-08T15:48:37.711Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-using-the-handle-secretsdump-is-selling-a-kernel-exploit-designed</loc>
    <lastmod>2026-04-08T15:48:38.521Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dawg-some-dork-compromised-litellm-and-was-able-to-successfully-do-a-supply-chai</loc>
    <lastmod>2026-04-08T15:48:38.742Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/poland-faced-a-surge-in-cyberattacks-in-2025-including-a-major-assault-on-the-en</loc>
    <lastmod>2026-04-08T15:49:59.336Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tax-search-ads-deliver-screenconnect-malware-using-huawei-driver-to-disable-edr</loc>
    <lastmod>2026-04-08T15:48:38.809Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-full-infrastructure-compromise-of-national-oil-ethiopia-with-800gb-erp-d-2</loc>
    <lastmod>2026-04-08T15:49:10.233Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-full-infrastructure-compromise-of-national-oil-ethiopia-with-800gb-erp-d</loc>
    <lastmod>2026-04-08T15:48:37.570Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackerone-discloses-a-data-breach-of-287-employees-after-navia-was-hacked-https-</loc>
    <lastmod>2026-04-08T15:48:36.350Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-warns-of-iran-s-handala-hack-group-using-fake-apps-to-spy-on-windows-users</loc>
    <lastmod>2026-04-08T15:49:56.726Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-ps-00552-2023</loc>
    <lastmod>2026-04-08T15:48:35.982Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202408496-3</loc>
    <lastmod>2026-04-08T15:49:58.714Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pharos-controls-mosaic-show-controller</loc>
    <lastmod>2026-04-08T15:48:36.780Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-plant-it-brewmaxx</loc>
    <lastmod>2026-04-08T15:47:41.504Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-ecostruxure-foxboro-dcs</loc>
    <lastmod>2026-04-08T15:48:36.854Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grassroots-dicom-gdcm</loc>
    <lastmod>2026-04-08T15:48:36.928Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-with-the-handle-punk-holding-a-manager-rank-has-leaked-the-databa</loc>
    <lastmod>2026-04-08T15:48:37.295Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-group-using-the-handle-nyxargroup-has-leaked-the-database-of-univ</loc>
    <lastmod>2026-04-08T15:48:37.220Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/github-openclaw-deployer-repo-delivers-trojan-instead</loc>
    <lastmod>2026-04-08T15:48:36.425Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner</loc>
    <lastmod>2026-04-08T15:48:35.619Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-using-the-handle-fanfan-has-leaked-the-database-of-17media-a-popu</loc>
    <lastmod>2026-04-08T15:48:35.553Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/major-claim-a-threat-actor-using-the-handle-luc1f3rg4ng-is-claiming-to-sell-insi</loc>
    <lastmod>2026-04-08T15:48:35.255Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-the-first-claim-of-the-crunchyroll-breach-has-hit-a-popular-dark-web-forum-a</loc>
    <lastmod>2026-04-08T15:48:35.321Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-using-the-handle-unit-pegasus-is-auctioning-network-access-to-a-c</loc>
    <lastmod>2026-04-08T15:48:34.592Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/extortion-group-claims-it-hacked-astrazeneca</loc>
    <lastmod>2026-04-08T15:48:34.738Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chrome-146-update-patches-high-severity-vulnerabilities</loc>
    <lastmod>2026-04-08T15:49:57.374Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yanluowang-ransomware-access-broker-gets-81-months-in-prison</loc>
    <lastmod>2026-04-08T15:48:34.668Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft</loc>
    <lastmod>2026-04-08T15:49:56.351Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackerone-discloses-employee-data-breach-after-navia-hack</loc>
    <lastmod>2026-04-08T15:49:55.352Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-access-broker-sentenced-to-over-6-years-in-prison-for-ransomware-schemes</loc>
    <lastmod>2026-04-08T15:49:58.642Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-ps-00552-2023-4</loc>
    <lastmod>2026-04-08T15:49:58.356Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/3-1-million-impacted-by-qualderm-data-breach</loc>
    <lastmod>2026-04-08T15:49:57.017Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-built-a-vast-camera-network-to-control-dissent-israel-turned-it-into-a-targ</loc>
    <lastmod>2026-04-08T15:49:57.304Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-citrix-netscaler-vulnerability-poised-for-exploitation-security-firms-w</loc>
    <lastmod>2026-04-08T15:49:58.855Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/smica83-also-there-is-a-related-by-ecs-ent-aff-mgr-in-net-traffic-sample-that-is</loc>
    <lastmod>2026-04-08T15:48:33.420Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials</loc>
    <lastmod>2026-04-08T15:48:34.814Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/darksword-iphone-exploit-leaked-online-hundreds-of-millions-at-risk</loc>
    <lastmod>2026-04-08T15:48:24.186Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-the-sample-is-another-base64-encoded-ps-script-that-will-load-the-next-st</loc>
    <lastmod>2026-04-08T15:48:32.158Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/stryker-says-malicious-file-found-during-probe-into-iran-linked-attack</loc>
    <lastmod>2026-04-08T15:49:57.578Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/your-body-is-betraying-your-right-to-privacy</loc>
    <lastmod>2026-04-08T15:48:31.561Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tmobile-2-related-malware-source-urls-https-tmobile-support-com-files-t-mobile-s</loc>
    <lastmod>2026-04-08T15:48:31.409Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/possible-interesting-fake-tmobile-security-patch-download-site-https-tmobile-sup</loc>
    <lastmod>2026-04-08T15:48:31.484Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-hacks-checkmarx-github-actions-using-stolen-ci-credentials</loc>
    <lastmod>2026-04-08T15:48:33.723Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/u-s-sentences-russian-hacker-to-6-75-years-for-role-in-9m-ransomware-damage</loc>
    <lastmod>2026-04-08T15:48:30.960Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/citrix-urges-patching-critical-netscaler-flaw-allowing-unauthenticated-data-leak</loc>
    <lastmod>2026-04-08T15:48:39.958Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gcore-radar-report-reveals-150-surge-in-ddos-attacks-year-on-year</loc>
    <lastmod>2026-04-08T15:48:17.892Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomware-s-new-era-moving-at-ai-speed</loc>
    <lastmod>2026-04-08T15:48:30.736Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/all-294-000-unreviewed-github-advisories-are-available-now-give-it-about-15-seco</loc>
    <lastmod>2026-04-08T15:48:30.669Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tycoon2fa-phishing-platform-returns-after-recent-police-disruption</loc>
    <lastmod>2026-04-08T15:48:30.519Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mazda-discloses-security-breach-exposing-employee-and-partner-data</loc>
    <lastmod>2026-04-08T15:49:56.948Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trivy-supply-chain-attack-targets-ci-cd-secrets</loc>
    <lastmod>2026-04-08T15:48:29.928Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-actor-is-claiming-590tb-of-data-from-ovhcloud-in-a-shared-file-tree-https-t-</loc>
    <lastmod>2026-04-08T15:48:29.785Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-canisterworm-targets-kubernetes-clusters-deploys-kamikaze-wiper</loc>
    <lastmod>2026-04-08T15:49:55.783Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/major-unconfirmed-breach-a-threat-actor-is-claiming-to-sell-a-major-breach-of-ov</loc>
    <lastmod>2026-04-08T15:48:29.336Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/crunchyroll-probes-breach-after-hacker-claims-to-steal-6-8m-users-data</loc>
    <lastmod>2026-04-08T15:48:29.191Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks</loc>
    <lastmod>2026-04-08T15:49:53.578Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware</loc>
    <lastmod>2026-04-08T15:48:28.670Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/there-s-this-fake-adblock-download-site-https-adblockplus-pro-it-has-russian-com</loc>
    <lastmod>2026-04-08T15:48:20.134Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unit-313-targeted-the-website-of-uae-identity-and-citizenship-https-t-co-w7idqef</loc>
    <lastmod>2026-04-08T15:48:27.926Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-phishing-campaign-is-abusing-an-official-device-code-oauth-flow-instead-of-ste</loc>
    <lastmod>2026-04-08T15:48:28.287Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trivy-supply-chain-attack-spreads-to-docker-github-repos</loc>
    <lastmod>2026-04-08T15:49:55.985Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-using-the-handle-rsosa-is-selling-reconnaissance-data-and-access-</loc>
    <lastmod>2026-04-08T15:48:27.386Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/an-ai-powered-phishing-campaign-has-compromised-hundreds-of-organizations</loc>
    <lastmod>2026-04-08T15:48:27.850Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-iranian-hackers-targeting-opponents-with-telegram-malware</loc>
    <lastmod>2026-04-08T15:49:40.223Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/open-closed-and-broken-prompt-fuzzing-finds-llms-still-fragile-across-open-and-c</loc>
    <lastmod>2026-04-08T15:48:27.312Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/our-research-introduces-genetic-algorithm-inspired-prompt-fuzzing-this-method-ge</loc>
    <lastmod>2026-04-08T15:48:27.247Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve-2026-3055-and-cve-</loc>
    <lastmod>2026-04-08T15:48:20.055Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/case-study-how-predictive-shielding-in-defender-stopped-gpo-based-ransomware-bef</loc>
    <lastmod>2026-04-08T15:48:26.953Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canisterworm-springs-wiper-attack-targeting-iran</loc>
    <lastmod>2026-04-08T15:49:55.284Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-phone-call-is-the-new-phishing-email</loc>
    <lastmod>2026-04-08T15:49:56.209Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-claim-expanded-bmw-breach-with-idor-exploit-employee-and-customer--2</loc>
    <lastmod>2026-04-08T15:48:31.030Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-claim-expanded-bmw-breach-with-idor-exploit-employee-and-customer-</loc>
    <lastmod>2026-04-08T15:47:49.064Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-using-the-handle-vexin-is-offering-corporate-cloud-accesses-at-a</loc>
    <lastmod>2026-04-08T15:47:43.307Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-verified-and-high-quality-crypto-leads-from-major-exch</loc>
    <lastmod>2026-04-08T15:47:44.719Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/routers-replace-pcs-as-primary-threat-vector-in-evolving-device-risk-landscape</loc>
    <lastmod>2026-04-08T15:49:52.667Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attackers-hide-infostealer-in-copyright-infringement-notices</loc>
    <lastmod>2026-04-08T15:48:27.105Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hacker-lands-remote-it-job-caught-after-vpn-slip</loc>
    <lastmod>2026-04-08T15:49:55.505Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-chile-x27-s-servicio-civil-platform-exposes-110k-public-servan</loc>
    <lastmod>2026-04-08T15:48:25.182Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-allopneus-exposes-453k-customers-and-739k-records-from-france--2</loc>
    <lastmod>2026-04-08T15:48:24.622Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-airsoft-entrepot-exposes-333k-customer-records-orders-invoices</loc>
    <lastmod>2026-04-08T15:47:19.470Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-allopneus-exposes-453k-customers-and-739k-records-from-france-</loc>
    <lastmod>2026-04-08T15:48:22.970Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-airsoft-entrepot-exposes-333k-customer-records-orders-invoices-2</loc>
    <lastmod>2026-04-08T15:48:19.223Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aqua-s-trivy-vulnerability-scanner-hit-by-supply-chain-attack</loc>
    <lastmod>2026-04-08T15:49:54.909Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/m-trends-2026-initial-access-handoff-shrinks-from-hours-to-22-seconds</loc>
    <lastmod>2026-04-08T15:49:54.067Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware</loc>
    <lastmod>2026-04-08T15:49:54.771Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-chile-x27-s-ley-del-lobby-platform-exposes-250gb-of-government</loc>
    <lastmod>2026-04-08T15:47:48.992Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-didn-t-reinvent-the-playbook-in-2025-they-refined-it-from-cobalt-s</loc>
    <lastmod>2026-04-08T15:48:18.508Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more</loc>
    <lastmod>2026-04-08T15:48:29.644Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-found-eight-attack-vectors-inside-aws-bedrock-here-s-what-attackers-can-do-wi</loc>
    <lastmod>2026-04-08T15:47:47.831Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/qnap-patches-four-vulnerabilities-exploited-at-pwn2own</loc>
    <lastmod>2026-04-08T15:49:53.236Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-broken-physics-of-remediation</loc>
    <lastmod>2026-04-08T15:47:44.932Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-warns-irs-phishing-hits-29-000-users-deploys-rmm-malware</loc>
    <lastmod>2026-04-08T15:49:12.508Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/police-shut-down-373-000-dark-web-sites-in-single-operator-csam-network</loc>
    <lastmod>2026-04-08T15:49:53.169Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-xbox-one-hacked-schneier-on-security</loc>
    <lastmod>2026-04-08T15:47:42.506Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tycoon-2fa-fully-operational-despite-law-enforcement-takedown</loc>
    <lastmod>2026-04-08T15:47:30.830Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks</loc>
    <lastmod>2026-04-08T15:49:52.597Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/global-crackdown-dismantles-4-botnets-behind-major-ddos-attacks</loc>
    <lastmod>2026-04-08T15:49:29.381Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper</loc>
    <lastmod>2026-04-08T15:47:25.350Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-kb5085516-emergency-update-fixes-microsoft-account-sign-in</loc>
    <lastmod>2026-04-08T15:49:35.994Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-cve-2025-32975-cvss-10-0-to-hijack-unpatched-quest-kace-sma-syst</loc>
    <lastmod>2026-04-08T15:48:29.263Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oracle-releases-emergency-patch-for-critical-identity-manager-vulnerability</loc>
    <lastmod>2026-04-08T15:49:53.931Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/crunchyroll-has-been-compromised-an-unknown-threat-actor-bribed-a-third-party-he</loc>
    <lastmod>2026-04-08T15:47:01.695Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/infinite-campus-inc-and-ameriprise-financial-inc-are-both-being-threatened-by-sh</loc>
    <lastmod>2026-04-08T15:48:25.701Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-advertising-rawhost-a-bulletproof-vps-hosting-service-that-exp</loc>
    <lastmod>2026-04-08T15:48:26.440Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-windows-desktop-wallet-sniffers-targeting-trezor-and-l</loc>
    <lastmod>2026-04-08T15:48:26.880Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-advertising-a-professional-malware-setup-service-catering-to-n</loc>
    <lastmod>2026-04-08T15:48:26.663Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/spirigatito-is-allegedly-selling-data-from-the-prefeitura-municipal-de-caieiras-</loc>
    <lastmod>2026-04-08T15:48:26.511Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-have-breached-aigner-immobilien-a-leading-real-estate-b</loc>
    <lastmod>2026-04-08T15:48:26.293Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/voidstealer-malware-steals-chrome-master-key-via-debugger-trick</loc>
    <lastmod>2026-04-08T15:48:26.070Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/another-domain-registration-for-breachforums-breachforums-fi-https-t-co-agdw75g4</loc>
    <lastmod>2026-04-08T15:48:25.786Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ac-breachforums-has-gone-live-https-t-co-3ptem2w3ep</loc>
    <lastmod>2026-04-08T15:48:25.630Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ransomware-group-identified-alp-001-two-major-companies-named-ingersoll-rand</loc>
    <lastmod>2026-04-08T15:48:25.487Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions</loc>
    <lastmod>2026-04-08T15:49:55.918Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-case-you-missed-it-what-happens-when-the-fortigate-next-generation-firewall-p</loc>
    <lastmod>2026-04-08T15:48:25.326Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-450-000-reservations-extracted-from-preferre</loc>
    <lastmod>2026-04-08T15:48:24.967Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-120-000-records-from-the-registraduria-nacio</loc>
    <lastmod>2026-04-08T15:48:25.110Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-magento-2-0-day-1-day-exploit-with-no-cve-</loc>
    <lastmod>2026-04-08T15:48:24.904Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-azure-monitor-alerts-abused-in-callback-phishing-campaigns</loc>
    <lastmod>2026-04-08T15:48:23.337Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks</loc>
    <lastmod>2026-04-08T15:48:24.831Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oracle-patches-critical-cve-2026-21992-enabling-unauthenticated-rce-in-identity-</loc>
    <lastmod>2026-04-08T15:48:24.690Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-quest-kace-vulnerability-potentially-exploited-in-attacks</loc>
    <lastmod>2026-04-08T15:49:55.066Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyberattack-on-a-car-breathalyzer-firm-leaves-drivers-stuck</loc>
    <lastmod>2026-04-08T15:48:24.550Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-pac</loc>
    <lastmod>2026-04-08T15:48:24.405Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-ps-00552-2023-2</loc>
    <lastmod>2026-04-08T15:49:53.440Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-ps-00552-2023-3</loc>
    <lastmod>2026-04-08T15:49:53.854Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ico-uk-reddit-inc</loc>
    <lastmod>2026-04-08T15:49:54.354Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10230412</loc>
    <lastmod>2026-04-08T15:49:55.709Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-u-s-justice-department-participated-in-a-court-authorized-law-enforcement-op</loc>
    <lastmod>2026-04-08T15:48:20.590Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interpol-disrupts-malicious-networks-globally-eu-sanctions-state-sponsored-threa</loc>
    <lastmod>2026-04-08T15:48:20.506Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hacker-group-lapsus-claims-alleged-astrazeneca-data-breach</loc>
    <lastmod>2026-04-08T15:47:30.970Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/on-march-4-2026-europol-announced-the-technical-disruption-of-tycoon2fa-a-phishi</loc>
    <lastmod>2026-04-08T15:48:20.286Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-cyberattack-affecting-intoxalock-is-causing-drivers-to-be-unable-to-start-thei</loc>
    <lastmod>2026-04-08T15:48:20.205Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-fbi-just-released-a-flash-warning-on-the-government-of-iran-cyber-actors-dep</loc>
    <lastmod>2026-04-08T15:48:20.360Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-fbi-and-cisa-have-issued-a-joint-psa-warning-that-hackers-linked-to-russian-</loc>
    <lastmod>2026-04-08T15:48:19.601Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/there-is-also-a-panel-simply-named-c2-web-interface-http-184-174-97-23-8081-http</loc>
    <lastmod>2026-04-08T15:48:19.372Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-has-allegedly-leaked-the-database-of-miljodata-a-swedish-system-s</loc>
    <lastmod>2026-04-08T15:48:19.530Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/patch-now-oracle-s-fusion-middleware-has-critical-rce-flaw</loc>
    <lastmod>2026-04-08T15:48:19.897Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-cisa-issue-psa-on-russian-intelligence-campaign-to-target-messaging-apps</loc>
    <lastmod>2026-04-08T15:49:55.215Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-links-signal-phishing-attacks-to-russian-intelligence-services</loc>
    <lastmod>2026-04-08T15:49:55.575Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyber-opsec-fail-beast-gang-exposes-ransomware-server</loc>
    <lastmod>2026-04-08T15:48:18.816Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trio-sentenced-for-facilitating-north-korean-it-worker-scheme-from-their-homes</loc>
    <lastmod>2026-04-08T15:49:53.786Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trivy-security-scanner-github-actions-breached-75-tags-hijacked-to-steal-ci-cd-s</loc>
    <lastmod>2026-04-08T15:48:18.279Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/police-take-down-373-000-fake-csam-sites-in-operation-alice</loc>
    <lastmod>2026-04-08T15:49:53.374Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw</loc>
    <lastmod>2026-04-08T15:49:54.490Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-intelligence-services-target-commercial-messaging-application-accounts</loc>
    <lastmod>2026-04-08T15:48:18.985Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-6-6-million-passenger-records-from-el-al-isr</loc>
    <lastmod>2026-04-08T15:48:17.734Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ubiquiti-defect-poses-account-takeover-risk-for-unifi-networking-application-use</loc>
    <lastmod>2026-04-08T15:48:17.369Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclo</loc>
    <lastmod>2026-04-08T15:48:17.660Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-new-android-safeguards-operation-alice-uk-toughens-cyber-reporting</loc>
    <lastmod>2026-04-08T15:49:54.146Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday</loc>
    <lastmod>2026-04-08T15:49:53.716Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-five-known-exploited-vulnerabilities-to-catalog</loc>
    <lastmod>2026-04-08T15:48:21.021Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/world-leaks-has-allegedly-claimed-the-city-of-los-angeles-la-the-listing-shows-1</loc>
    <lastmod>2026-04-08T15:47:50.881Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-fake-zoom-meeting-invite-scam-spreads-malware-on-windows-pcs</loc>
    <lastmod>2026-04-08T15:49:54.841Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/justice-department-disrupts-botnet-networks-that-hijacked-3-million-devices</loc>
    <lastmod>2026-04-08T15:49:54.214Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/regphantom-a-signed-windows-kernel-rootkit-that-turns-the-registry-into-a-covert-2</loc>
    <lastmod>2026-04-08T15:47:50.256Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-has-allegedly-leaked-data-from-https-t-co-goqzwoeqwb-an-independe</loc>
    <lastmod>2026-04-08T15:47:50.679Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/regphantom-a-signed-windows-kernel-rootkit-that-turns-the-registry-into-a-covert</loc>
    <lastmod>2026-04-08T15:47:50.183Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china</loc>
    <lastmod>2026-04-08T15:49:55.851Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/how-cisos-can-survive-the-era-of-geopolitical-cyberattacks</loc>
    <lastmod>2026-04-08T15:49:55.148Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/2-7-million-hit-in-workplace-benefits-data-breach-exposing-ssns-dates-of-birth-a</loc>
    <lastmod>2026-04-08T15:47:49.767Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/magento-polyshell-flaw-enables-unauthenticated-uploads-rce-and-account-takeover</loc>
    <lastmod>2026-04-08T15:47:49.277Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-sc</loc>
    <lastmod>2026-04-08T15:49:28.619Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/navia-data-breach-impacts-2-7-million</loc>
    <lastmod>2026-04-08T15:47:48.501Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-confirms-handala-link-to-iran-government-amid-takedown-of-hackers-sites</loc>
    <lastmod>2026-04-08T15:49:54.421Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interlock-ransomware-targets-cisco-enterprise-firewalls</loc>
    <lastmod>2026-04-08T15:47:48.572Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/thousands-of-magento-sites-hit-in-ongoing-defacement-campaign</loc>
    <lastmod>2026-04-08T15:47:47.396Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-danger-behind-meta-s-decision-to-kill-end-to-end-encrypted-instagram-dms</loc>
    <lastmod>2026-04-08T15:47:47.689Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-langflow-vulnerability-exploited-hours-after-public-disclosure</loc>
    <lastmod>2026-04-08T15:47:47.106Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aisuru-and-kimwolf-ddos-botnets-disrupted-in-international-operation</loc>
    <lastmod>2026-04-08T15:47:47.177Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/international-joint-action-disrupts-world-s-largest-ddos-botnets</loc>
    <lastmod>2026-04-08T15:49:53.647Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-stealit-campaign-abuses-node-js-single-executable-application-fortiguard-lab</loc>
    <lastmod>2026-04-08T15:47:46.525Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ex-data-analyst-stole-company-data-in-2-5m-extortion-scheme</loc>
    <lastmod>2026-04-08T15:49:53.304Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/doj-disrupts-3-million-device-iot-botnets-behind-record-31-4-tbps-global-ddos-at</loc>
    <lastmod>2026-04-08T15:48:21.107Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-warns-older-iphones-vulnerable-to-coruna-darksword-exploit-kit-attacks</loc>
    <lastmod>2026-04-08T15:47:46.595Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-carolina-tech-worker-found-guilty-of-insider-attack-netting-2-5m-ransom</loc>
    <lastmod>2026-04-08T15:47:46.457Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-wordpress-core-remote-code-execution-rce-0</loc>
    <lastmod>2026-04-08T15:47:45.976Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/feds-disrupt-iot-botnets-behind-huge-ddos-attacks</loc>
    <lastmod>2026-04-08T15:49:52.883Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-takes-down-botnets-used-in-record-breaking-cyberattacks</loc>
    <lastmod>2026-04-08T15:47:45.764Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/justice-department-disrupts-iranian-cyber-enabled-psychological-operations</loc>
    <lastmod>2026-04-08T15:47:45.622Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/another-breachforums-domain-registration-forum-is-currently-being-tested-breachf</loc>
    <lastmod>2026-04-08T15:47:45.419Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/signed-rmm-and-synthetic-domains-are-exploited-to-bypass-cybersecurity-tactic-hi</loc>
    <lastmod>2026-04-08T15:47:44.856Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/speagle-malware-hijacks-cobra-docguard-to-steal-data-via-compromised-servers</loc>
    <lastmod>2026-04-08T15:47:44.583Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/54-edr-killers-use-byovd-to-exploit-34-signed-vulnerable-drivers-and-disable-sec</loc>
    <lastmod>2026-04-08T15:47:44.652Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/navia-discloses-data-breach-impacting-2-7-million-people</loc>
    <lastmod>2026-04-08T15:48:21.185Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores</loc>
    <lastmod>2026-04-08T15:49:53.099Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/feds-keep-eyes-peeled-for-iran-cyberattacks-respond-to-stryker-breach</loc>
    <lastmod>2026-04-08T15:49:53.027Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-screenconnect-vulnerability-exposes-machine-keys</loc>
    <lastmod>2026-04-08T15:47:32.508Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitrefill-blames-north-korean-lazarus-group-for-cyberattack</loc>
    <lastmod>2026-04-08T15:49:52.958Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/defender-tip-monitor-for-vol-exe-or-python-exe-interacting-with-memory-dump-file</loc>
    <lastmod>2026-04-08T15:47:42.945Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-are-bringing-their-own-forensics-in-a-recent-clickfix-campaign-we-</loc>
    <lastmod>2026-04-08T15:47:43.523Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-flow-a-fake-verify-you-are-human-prompt-leads-to-node-js-c2-interlock-rat-fo</loc>
    <lastmod>2026-04-08T15:47:43.379Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/marquis-data-breach-affects-672-000-individuals</loc>
    <lastmod>2026-04-08T15:49:40.670Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-readied-cyberattack-capabilities-for-response-prior-to-epic-fury</loc>
    <lastmod>2026-04-08T15:49:54.701Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-seizes-handala-data-leak-site-after-stryker-cyberattack</loc>
    <lastmod>2026-04-08T15:49:52.811Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-in-thailand-working-with-partners-to-shut-down-region-s-scam-centers-that-ta</loc>
    <lastmod>2026-04-08T15:47:42.725Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-tax-season-becomes-cyberattack-season-phishing-and-malware-campaigns-using-</loc>
    <lastmod>2026-04-08T15:49:52.742Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-4</loc>
    <lastmod>2026-04-08T15:48:21.253Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mitsubishi-electric-cnc-series</loc>
    <lastmod>2026-04-08T15:47:41.725Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-ecostruxure-pme-and-epo</loc>
    <lastmod>2026-04-08T15:47:42.435Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-modicon-controllers-m241-m251-m258-and-lmc058</loc>
    <lastmod>2026-04-08T15:47:42.796Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-ecostruxure-automation-expert</loc>
    <lastmod>2026-04-08T15:47:43.087Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/igl-technologies-eparking-fi</loc>
    <lastmod>2026-04-08T15:47:35.420Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/automated-logic-webctrl-premium-server</loc>
    <lastmod>2026-04-08T15:47:43.014Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ctek-chargeportal</loc>
    <lastmod>2026-04-08T15:47:42.362Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-modicon-m241-m251-and-m262</loc>
    <lastmod>2026-04-08T15:47:42.870Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/berkadia-commercial-mortgage-llc-has-been-given-a-final-warning-that-if-the-rans</loc>
    <lastmod>2026-04-08T15:47:37.351Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-perseus-android-banking-malware-monitors-notes-apps-to-extract-sensitive-dat</loc>
    <lastmod>2026-04-08T15:47:34.670Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-more</loc>
    <lastmod>2026-04-08T15:47:44.790Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-apt-exploits-zimbra-vulnerability-against-ukraine</loc>
    <lastmod>2026-04-08T15:49:24.249Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/security-firm-aura-discloses-data-breach-impacting-900-000-records</loc>
    <lastmod>2026-04-08T15:49:40.296Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-advertising-atroposia-rat-an-advanced-remote-access-trojan-bui</loc>
    <lastmod>2026-04-08T15:47:42.224Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-over-70-million-u-s-consumer-marketing-recor</loc>
    <lastmod>2026-04-08T15:47:42.294Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/max-severity-ubiquiti-unifi-flaw-may-allow-account-takeover</loc>
    <lastmod>2026-04-08T15:47:33.142Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/russian-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks</loc>
    <lastmod>2026-04-08T15:48:51.211Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/spycloud-s-2026-identity-exposure-report-reveals-explosion-of-non-human-identity</loc>
    <lastmod>2026-04-08T15:47:42.086Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-urges-us-orgs-to-secure-microsoft-intune-systems-after-stryker-breach</loc>
    <lastmod>2026-04-08T15:47:40.707Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-windsurf-ide-extension-uses-solana-blockchain-to-steal-developer-data</loc>
    <lastmod>2026-04-08T15:47:41.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-perseus-android-malware-checks-user-notes-for-secrets</loc>
    <lastmod>2026-04-08T15:47:37.165Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-microsoft-sharepoint-flaw-now-exploited-in-attacks</loc>
    <lastmod>2026-04-08T15:49:50.245Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover</loc>
    <lastmod>2026-04-08T15:47:41.653Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-warns-of-attacks-exploiting-recent-sharepoint-vulnerability</loc>
    <lastmod>2026-04-08T15:49:54.564Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-firewall-vulnerability-exploited-as-zero-day-in-interlock-ransomware-attac</loc>
    <lastmod>2026-04-08T15:47:34.954Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware-a</loc>
    <lastmod>2026-04-08T15:47:34.514Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-breachforums-domain-registration-breachforums-ac-https-t-co-gqzeswydpb</loc>
    <lastmod>2026-04-08T15:47:31.477Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aura-confirms-data-breach-exposing-900-000-marketing-contacts</loc>
    <lastmod>2026-04-08T15:48:50.917Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-org</loc>
    <lastmod>2026-04-08T15:47:30.458Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/c2-implant-snappyclient-targets-crypto-wallets</loc>
    <lastmod>2026-04-08T15:47:27.482Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/darksword-iphone-exploit-kit-serves-spies-amp-thieves-alike</loc>
    <lastmod>2026-04-08T15:47:28.027Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-s-latest-vulnerability-spree-has-a-more-troubling-pattern-underneath</loc>
    <lastmod>2026-04-08T15:49:35.227Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-march-18th-2026</loc>
    <lastmod>2026-04-08T15:47:42.016Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-kev-catalog</loc>
    <lastmod>2026-04-08T15:47:40.350Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-collapse-of-predictive-security-in-the-age-of-machine-speed-attacks</loc>
    <lastmod>2026-04-08T15:47:41.068Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-has-added-2-vulnerabilities-to-the-kev-catalog-https-t-co-9idguahikd-cve-20</loc>
    <lastmod>2026-04-08T15:47:41.358Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks</loc>
    <lastmod>2026-04-08T15:48:21.479Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-3</loc>
    <lastmod>2026-04-08T15:47:41.429Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-21236-windows-ancillary-function-driver-for-winsock-elevation-of-privil</loc>
    <lastmod>2026-04-08T15:47:40.850Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-be-selling-a-database-from-credit-institute-vietnam-con</loc>
    <lastmod>2026-04-08T15:48:21.333Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/connectwise-patches-new-flaw-allowing-screenconnect-hijacking</loc>
    <lastmod>2026-04-08T15:47:30.177Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-2</loc>
    <lastmod>2026-04-08T15:47:40.568Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claudy-day-flaws-allow-data-theft-via-fake-claude-ai-ads-report</loc>
    <lastmod>2026-04-08T15:48:57.180Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-government-and-police-email-access-along-with-law-enfo</loc>
    <lastmod>2026-04-08T15:47:40.776Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ofac-sanctions-dprk-it-worker-network-funding-wmd-programs-through-fake-remote-j</loc>
    <lastmod>2026-04-08T15:47:40.638Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sector-drainer-advertised-as-crypto-wallet-drainer-as-a-service-with-0-day-phant-2</loc>
    <lastmod>2026-04-08T15:47:39.902Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-tanzania-x27-s-brela-government-database-exposes-10-2-million-</loc>
    <lastmod>2026-04-08T15:47:39.630Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sector-drainer-advertised-as-crypto-wallet-drainer-as-a-service-with-0-day-phant</loc>
    <lastmod>2026-04-08T15:47:39.097Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-tanzania-s-brela-government-database-exposes-10-2-million-reco</loc>
    <lastmod>2026-04-08T15:47:39.764Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/marquis-ransomware-gang-stole-data-of-672k-people-in-cyberattack</loc>
    <lastmod>2026-04-08T15:49:52.182Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomware-gang-exploits-cisco-flaw-in-zero-day-attacks-since-january</loc>
    <lastmod>2026-04-08T15:49:52.458Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-daryn-online-exposes-4-million-user-records-from-kazakhstan-x2</loc>
    <lastmod>2026-04-08T15:48:21.403Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-breach-of-daryn-online-exposes-4-million-user-records-from-kazakhstan-s-</loc>
    <lastmod>2026-04-08T15:47:38.497Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-claims-to-have-conducted-a-large-scale-breach-targeting-the-surve</loc>
    <lastmod>2026-04-08T15:47:38.427Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claudy-day-trio-of-flaws-exposes-claude-users-to-data-theft</loc>
    <lastmod>2026-04-08T15:47:39.015Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access</loc>
    <lastmod>2026-04-08T15:47:39.696Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors</loc>
    <lastmod>2026-04-08T15:47:38.069Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/partial-leak-of-knownsec-corporate-documents-resurfaces-with-espionage-tradecraf-2</loc>
    <lastmod>2026-04-08T15:47:38.870Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unprotected-how-a-critical-electron-misconfiguration-compromises-session-desktop</loc>
    <lastmod>2026-04-08T15:47:37.640Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-auctioning-shopify-api-access-to-a-canadian-e-commerce-store-p</loc>
    <lastmod>2026-04-08T15:47:37.711Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/community-alert-security-researcher-ryan-moran-has-published-a-writeup-on-sessio</loc>
    <lastmod>2026-04-08T15:47:37.782Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/partial-leak-of-knownsec-corporate-documents-resurfaces-with-espionage-tradecraf</loc>
    <lastmod>2026-04-08T15:47:37.919Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-iraqi-electoral-register-databases-for-citiz</loc>
    <lastmod>2026-04-08T15:47:37.852Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/second-ios-exploit-kit-emerges-from-suspected-russian-hackers-using-possible-u-s</loc>
    <lastmod>2026-04-08T15:49:52.316Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/eu-sanctions-chinese-iranian-firms-supporting-hacking-operations</loc>
    <lastmod>2026-04-08T15:49:54.996Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shadow-ai-risk-how-saas-apps-are-quietly-enabling-massive-breaches</loc>
    <lastmod>2026-04-08T15:49:52.111Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones</loc>
    <lastmod>2026-04-08T15:49:43.785Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nordstrom-s-email-system-abused-to-send-crypto-scams-to-customers</loc>
    <lastmod>2026-04-08T15:47:29.681Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild</loc>
    <lastmod>2026-04-08T15:47:36.722Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zabbix-panel-here-http-46-30-188-99-8443-login-same-8443-port-just-as-for-the-pr</loc>
    <lastmod>2026-04-08T15:47:36.512Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sidewinder-espionage-campaign-expands-across-southeast-asia</loc>
    <lastmod>2026-04-08T15:47:36.065Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-soc-files-time-to-sapecar-unpacking-a-new-horabot-campaign-in-mexico</loc>
    <lastmod>2026-04-08T15:47:35.649Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-net-aot-malware-hides-code-as-a-black-box-to-evade-detection</loc>
    <lastmod>2026-04-08T15:49:37.996Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/9-critical-ip-kvm-flaws-enable-unauthenticated-root-access-across-four-vendors</loc>
    <lastmod>2026-04-08T15:47:35.716Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-code-security-and-magecart-getting-the-threat-model-right</loc>
    <lastmod>2026-04-08T15:47:35.996Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-hackers-likely-used-malware-stolen-credentials-in-stryker-breach</loc>
    <lastmod>2026-04-08T15:49:44.347Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-clickfix-scam-tricks-users-into-mapping-hacker-controlled-drives</loc>
    <lastmod>2026-04-08T15:47:30.108Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-exp</loc>
    <lastmod>2026-04-08T15:47:34.882Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and-m</loc>
    <lastmod>2026-04-08T15:47:34.812Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce-</loc>
    <lastmod>2026-04-08T15:47:34.592Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-pushes-first-background-security-improvements-update-to-fix-webkit-flaw</loc>
    <lastmod>2026-04-08T15:49:42.051Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/boggy-serpens-threat-assessment</loc>
    <lastmod>2026-04-08T15:47:34.357Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/boggy-serpens-an-iranian-state-sponsored-threat-group-now-uses-ai-assisted-malwa</loc>
    <lastmod>2026-04-08T15:47:34.212Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/suspected-china-based-espionage-operation-against-military-targets-in-southeast-</loc>
    <lastmod>2026-04-08T15:47:27.354Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/our-investigation-into-cl-sta-1087-uncovers-new-applechris-and-memfun-backdoors-</loc>
    <lastmod>2026-04-08T15:47:33.568Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-admin-and-super-admin-panel-access-to-ampere</loc>
    <lastmod>2026-04-08T15:47:34.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/glassworm-malware-hits-400-code-repos-on-github-npm-vscode-openvsx</loc>
    <lastmod>2026-04-08T15:49:27.466Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/less-lucrative-ransomware-market-makes-attackers-alter-methods</loc>
    <lastmod>2026-04-08T15:47:26.696Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/more-attackers-are-logging-in-not-breaking-in</loc>
    <lastmod>2026-04-08T15:47:33.712Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root</loc>
    <lastmod>2026-04-08T15:48:51.649Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-target-cybersecurity-firm-outpost24-in-7-stage-phish</loc>
    <lastmod>2026-04-08T15:47:33.070Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/storm-2561-uses-fake-fortinet-ivanti-vpn-sites-to-drop-hyrax-infostealer</loc>
    <lastmod>2026-04-08T15:49:15.968Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-sharing-a-fresh-ulp-url-login-pass-stealer-log-collection-date</loc>
    <lastmod>2026-04-08T15:47:32.930Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-hacktivist-group-indohaxsec-indonesian-haxor-security-claims-to-have-leaked-da</loc>
    <lastmod>2026-04-08T15:47:32.217Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-has-posted-source-code-allegedly-stolen-from-e-accounting-a-south</loc>
    <lastmod>2026-04-08T15:47:32.076Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/europe-sanctions-chinese-and-iranian-firms-for-cyberattacks</loc>
    <lastmod>2026-04-08T15:48:21.764Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-flaws-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-rce</loc>
    <lastmod>2026-04-08T15:47:29.608Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ip-195-211-190-189-was-hosted-on-infrastructure-from-railnet-llc-a-legal-fro</loc>
    <lastmod>2026-04-08T15:47:31.041Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/countering-current-geopolitical-cyber-threats-based-on-cisa-intel-with-qualys</loc>
    <lastmod>2026-04-08T15:49:41.979Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-vpn-0-day-bypass-up-for-sale-for-3-btc-https-t-co-rqome3qfop</loc>
    <lastmod>2026-04-08T15:47:29.267Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-has-allegedly-leaked-data-on-approximately-60-000-unique-french-g</loc>
    <lastmod>2026-04-08T15:48:21.622Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/warlock-ransomware-group-augments-post-exploitation-activities</loc>
    <lastmod>2026-04-08T15:47:28.989Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/siemens-sicam-siapp-sdk</loc>
    <lastmod>2026-04-08T15:47:26.355Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-ecostruxure-data-center-expert</loc>
    <lastmod>2026-04-08T15:47:28.505Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/schneider-electric-scadapack-and-remoteconnect</loc>
    <lastmod>2026-04-08T15:47:28.919Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/codesys-in-festo-automation-suite</loc>
    <lastmod>2026-04-08T15:47:40.046Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/clickfix-attack-targets-devs-with-macsync-malware-via-fake-claude-tools</loc>
    <lastmod>2026-04-08T15:49:40.011Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader</loc>
    <lastmod>2026-04-08T15:47:31.793Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uk-companies-house-exposed-details-of-millions-of-firms</loc>
    <lastmod>2026-04-08T15:48:21.855Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/labscon25-replay-your-apps-may-be-gone-but-the-hackers-made-9-billion-and-they-r</loc>
    <lastmod>2026-04-08T15:47:31.409Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attackers-don-t-just-target-wallets-they-exploit-every-weak-point-in-the-archite</loc>
    <lastmod>2026-04-08T15:47:29.970Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-1-5-million-records-from-clinica-panamerican</loc>
    <lastmod>2026-04-08T15:48:21.690Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-90k-confidential-records-from-bt-travel-bt-t</loc>
    <lastmod>2026-04-08T15:47:29.542Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-font-rendering-trick-hides-malicious-commands-from-ai-tools</loc>
    <lastmod>2026-04-08T15:49:22.051Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gitguardian-reports-an-81-surge-of-ai-service-leaks-as-29m-secrets-hit-public-gi</loc>
    <lastmod>2026-04-08T15:47:26.167Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/174-vulnerabilities-targeted-by-rondodox-botnet</loc>
    <lastmod>2026-04-08T15:49:39.062Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/leaknet-ransomware-uses-clickfix-deno-runtime-in-stealthy-attacks</loc>
    <lastmod>2026-04-08T15:49:32.397Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web</loc>
    <lastmod>2026-04-08T15:47:24.387Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/south-korean-police-accidentally-post-cryptocurrency-wallet-password-schneier-on</loc>
    <lastmod>2026-04-08T15:48:21.926Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-vidar-2-0-infostealer-spreads-via-fake-game-cheats-on-github-reddit</loc>
    <lastmod>2026-04-08T15:49:32.318Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/it-s-time-to-get-serious-about-post-quantum-security-here-s-where-to-start</loc>
    <lastmod>2026-04-08T15:47:25.416Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/konni-deploys-endrat-through-phishing-uses-kakaotalk-to-propagate-malware</loc>
    <lastmod>2026-04-08T15:47:24.102Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-apis-and-ddos-collide-in-new-era-of-coordinated-cyberattacks</loc>
    <lastmod>2026-04-08T15:49:37.922Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-flags-year-old-wing-ftp-vulnerability-as-exploited</loc>
    <lastmod>2026-04-08T15:49:55.642Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths</loc>
    <lastmod>2026-04-08T15:47:24.453Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-has-allegedly-leaked-a-kyc-know-your-customer-dataset-for-free-re</loc>
    <lastmod>2026-04-08T15:47:12.239Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-has-allegedly-leaked-the-database-of-https-t-co-5dp2nkfmnh-an-ai-</loc>
    <lastmod>2026-04-08T15:47:27.888Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-auctioning-credit-card-data-harvested-from-a-uk-based-wordpres</loc>
    <lastmod>2026-04-08T15:47:29.828Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uk-s-companies-house-confirms-security-flaw-exposed-business-data</loc>
    <lastmod>2026-04-08T15:48:22.070Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks</loc>
    <lastmod>2026-04-08T15:49:24.708Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed</loc>
    <lastmod>2026-04-08T15:49:29.232Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-nexus-hackers-skulk-in-southeast-asian-military-orgs-for-years</loc>
    <lastmod>2026-04-08T15:47:13.809Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/glassworm-malware-evolves-to-hide-in-dependencies</loc>
    <lastmod>2026-04-08T15:47:28.722Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/help-on-the-line-how-a-microsoft-teams-support-call-led-to-compromise</loc>
    <lastmod>2026-04-08T15:49:18.825Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-5</loc>
    <lastmod>2026-04-08T15:48:21.995Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-find-data-leak-risk-in-aws-bedrock-ai-code-interpreter</loc>
    <lastmod>2026-04-08T15:49:24.101Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-phishing-scam-uses-livechat-to-pose-as-amazon-and-paypal-in-real-time</loc>
    <lastmod>2026-04-08T15:49:44.279Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-investigates-steam-games-linked-to-malware-and-crypto-wallet-theft</loc>
    <lastmod>2026-04-08T15:47:30.036Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zero-lessons-learned-convicted-scammer-allegedly-ran-another-athlete-focused-phi</loc>
    <lastmod>2026-04-08T15:49:40.601Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-rep</loc>
    <lastmod>2026-04-08T15:47:23.629Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/companies-house-restores-webfiling-after-flaw-exposed-director-details</loc>
    <lastmod>2026-04-08T15:48:22.139Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oracle-ebs-hack-only-4-corporate-giants-still-silent-on-potential-impact</loc>
    <lastmod>2026-04-08T15:49:19.130Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-the-kordon-database-from-the-russian-federa</loc>
    <lastmod>2026-04-08T15:48:22.216Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-auctioning-full-admin-access-and-shell-access-to-a-uk-based-wo</loc>
    <lastmod>2026-04-08T15:47:25.963Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/security-firm-executive-targeted-in-sophisticated-phishing-attack</loc>
    <lastmod>2026-04-08T15:49:22.128Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/free-real-estate-gopix-the-banking-trojan-living-off-your-memory</loc>
    <lastmod>2026-04-08T15:47:30.690Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
</urlset>