<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://threatnoir.com/</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/feed</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-soc</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-leaders</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-learners</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/for-developers</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/feed.xml</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/articles/feed.xml</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/awareness/feed.xml</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/focus/feed.xml</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>hourly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/podcast/feed.xml</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/show/feed.xml</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/api/weekly/feed.xml</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/iocs</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/podcast</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/podcast/archive</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/awareness</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/resources</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/developer</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/review</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/contact</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/legal</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/subscribe</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/auth/signup</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/auth/login</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ai-security</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/breaches</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ccpa-cpra</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/cloud-security</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/compliance</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/cryptography</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/dora</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/dsa-dma</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-ai-act</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-cyber-resilience-act</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/eu-cybersecurity-act</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/gdpr</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/hipaa</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/identity-access</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/incident-response</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/iot-ot</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/malware</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nation-state</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nis2</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/nist</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/open-source</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/pci-dss</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/policy</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/privacy</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/privacy-fines</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/ransomware</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/sec-cyber</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/supply-chain</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/threat-intelligence</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/tools</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/uk-data-protection</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/vulnerabilities</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tag/zero-day</loc>
    <lastmod>2026-05-21T13:04:36.945Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w20</loc>
    <lastmod>2026-05-17T05:01:45.808Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w19</loc>
    <lastmod>2026-05-10T05:01:44.372Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w18</loc>
    <lastmod>2026-05-03T07:36:12.240Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w17</loc>
    <lastmod>2026-04-26T07:59:12.542Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w16</loc>
    <lastmod>2026-04-20T04:31:16.828Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w15</loc>
    <lastmod>2026-04-13T00:01:17.779Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w14</loc>
    <lastmod>2026-04-06T00:02:09.939Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/weekly/2026-w13</loc>
    <lastmod>2026-03-31T19:50:57.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/our-research-reveals-agent-god-mode-in-amazon-bedrock-agentcore-overly-broad-iam-moeh6zgi</loc>
    <lastmod>2026-04-27T16:05:21.499Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/firestarter-backdoor-moeh6xo2</loc>
    <lastmod>2026-04-27T16:05:21.499Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign-moef218f</loc>
    <lastmod>2026-04-27T15:05:21.675Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/cve-2026-34197-13-year-old-apache-activemq-rce-via-jolokia-api-surfaces-for-in-t-mo7if4th</loc>
    <lastmod>2026-04-25T14:09:53.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/52m-download-protobuf-js-library-hit-by-rce-in-schema-handling-mo7if6w9</loc>
    <lastmod>2026-04-25T14:09:53.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/a-threat-actor-operating-under-the-alias-spider321-has-shared-samples-of-an-alle-mo7if8of</loc>
    <lastmod>2026-04-25T14:09:53.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/horner-automation-cscape-and-xl4-xl7-plc-mo4lcljc</loc>
    <lastmod>2026-04-20T18:09:46.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face-mo4lcjwb</loc>
    <lastmod>2026-04-20T18:09:46.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/zionsiphon-malware-designed-to-sabotage-water-treatment-systems-mo4lcn8j</loc>
    <lastmod>2026-04-20T18:09:46.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/wolfssl-vulnerability-hits-iot-routers-and-military-systems-update-to-5-9-1-now-mo1m7mn5</loc>
    <lastmod>2026-04-18T17:08:26.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/10-domain-could-have-handed-hackers-25k-endpoints-including-in-ot-and-gov-networ-mo1m7ov2</loc>
    <lastmod>2026-04-18T17:08:26.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeov-mo1m7keq</loc>
    <lastmod>2026-04-18T17:08:26.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side-mnyrbi1z</loc>
    <lastmod>2026-04-16T15:09:14.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/north-korea-s-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware-mnyrbkd1</loc>
    <lastmod>2026-04-16T15:09:14.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/apt41-delivers-zero-detection-backdoor-to-harvest-cloud-credentials-mnyrbfx2</loc>
    <lastmod>2026-04-16T15:09:14.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/ugly-iranian-apts-confirmed-inside-u-s-water-energy-and-government-infrastructur-mnvwe5ji</loc>
    <lastmod>2026-04-14T15:08:54.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides-mnvwe3qm</loc>
    <lastmod>2026-04-14T15:08:54.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/good-fbi-dismantles-gru-apt28-dns-hijacking-network-23-states-thousands-of-route-mnvwe779</loc>
    <lastmod>2026-04-14T15:08:54.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/inside-the-fbi-s-router-takedown-that-cut-off-apt28-s-tremendous-access-mnszfjr8</loc>
    <lastmod>2026-04-12T15:07:38.215Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/threat-actor-claims-to-be-selling-cisco-source-code-and-database-containing-3-15-mnszfhuj</loc>
    <lastmod>2026-04-12T15:07:38.215Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december-mnszffup</loc>
    <lastmod>2026-04-12T15:07:38.215Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto-mnq4jb72</loc>
    <lastmod>2026-04-10T14:09:20.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/a-well-known-initial-access-broker-is-selling-root-level-remote-code-execution-a-mnq4jkqg</loc>
    <lastmod>2026-04-10T14:09:20.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/russian-forest-blizzard-hackers-hijack-home-routers-for-global-spying-mnq4jdon</loc>
    <lastmod>2026-04-10T14:09:20.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released-mnn9mfvv</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/hackers-exploit-react2shell-in-automated-credential-theft-campaign-mnn9mhj4</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-mnn9me4z</loc>
    <lastmod>2026-04-08T14:09:00.855Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack-mnkcn24d</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more--mnkcn428</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/focus/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities-mnkcn0gz</loc>
    <lastmod>2026-04-06T14:08:05.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/basics-of-spm-june-2026</loc>
    <lastmod>2026-05-21T02:01:06.978Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/designing-secure-and-effective-corporate-id-credentials</loc>
    <lastmod>2026-05-21T02:01:06.502Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-open-house-series-3</loc>
    <lastmod>2026-05-20T02:01:08.883Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sans-cyber-defense-initiative-2026</loc>
    <lastmod>2026-05-20T02:00:58.565Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gartner-security-risk-management-summit-2026</loc>
    <lastmod>2026-05-20T02:00:57.153Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infosecurity-europe-2026</loc>
    <lastmod>2026-05-20T02:00:56.138Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-cybersecurity-challenge-2026</loc>
    <lastmod>2026-05-18T02:00:45.072Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberx-egypt-2026</loc>
    <lastmod>2026-05-18T02:00:44.273Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/qubit-conference-prague-2026</loc>
    <lastmod>2026-05-18T02:00:43.920Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/red-hot-cyber-conference-2026</loc>
    <lastmod>2026-05-18T02:00:43.331Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/you-sh0t-the-sheriff-ysts-2026</loc>
    <lastmod>2026-05-18T02:00:42.886Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-nairobi-2026</loc>
    <lastmod>2026-05-18T02:00:42.435Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ozcon-2026</loc>
    <lastmod>2026-05-18T02:00:41.984Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cisco-connect-2026-uk-ireland</loc>
    <lastmod>2026-05-17T02:00:48.215Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ieee-symposium-on-security-and-privacy-sp-2026</loc>
    <lastmod>2026-05-16T02:00:52.558Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/patch-tuesday-support-group-may-2026</loc>
    <lastmod>2026-05-16T02:00:50.723Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/west-ciso-and-cybersecurity-leaders-forum-2026</loc>
    <lastmod>2026-05-16T02:00:50.141Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-cryptography-and-information-security-cris-2026</loc>
    <lastmod>2026-05-16T02:00:49.123Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/hackmiami-1101</loc>
    <lastmod>2026-05-16T02:00:48.696Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/le-tour-du-hack-2026</loc>
    <lastmod>2026-05-16T02:00:47.692Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/nolacon-2026</loc>
    <lastmod>2026-05-15T02:00:51.104Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/expo-seguridad-m-xico-2026-2</loc>
    <lastmod>2026-05-14T02:01:11.909Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/siathere-nashville</loc>
    <lastmod>2026-05-14T02:01:09.998Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/government-cybersecurity-showcase-aotearoa-2026</loc>
    <lastmod>2026-05-12T02:01:00.832Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-network-group-fs-information-security-network-uk-2026</loc>
    <lastmod>2026-05-12T02:01:00.081Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-forum-threat-intel-2026</loc>
    <lastmod>2026-05-12T02:00:59.287Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/europe-it-security-conference-2026</loc>
    <lastmod>2026-05-12T02:00:58.273Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/kb4-con-2026</loc>
    <lastmod>2026-05-12T02:00:57.067Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-open-house-series-2</loc>
    <lastmod>2026-05-08T02:01:14.788Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/donversations-live-with-special-guest-mike-mathes-2</loc>
    <lastmod>2026-05-08T02:01:10.858Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/isaca-north-america-conference-2026</loc>
    <lastmod>2026-05-06T02:00:47.845Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/hack-space-con-2026</loc>
    <lastmod>2026-05-06T02:00:47.169Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/dicyfor-ai-security-summit-singapore-2026</loc>
    <lastmod>2026-05-06T02:00:46.650Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/pivotcon-2026</loc>
    <lastmod>2026-05-06T02:00:46.166Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/v2-security-copenhagen-2026</loc>
    <lastmod>2026-05-06T02:00:45.672Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-belo-horizonte-2026</loc>
    <lastmod>2026-05-06T02:00:44.623Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/from-paperwork-to-provenance-navigating-the-fedramp-20x-pivot</loc>
    <lastmod>2026-05-05T02:01:11.784Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-bay-area-2026</loc>
    <lastmod>2026-05-05T02:01:11.351Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopsdays-austin-2026</loc>
    <lastmod>2026-05-05T02:01:10.718Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gisec-global-2026</loc>
    <lastmod>2026-05-05T02:01:10.204Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-road-to-2026-security-travel-and-threat-intelligence-for-the-world-s-biggest</loc>
    <lastmod>2026-05-05T02:01:09.836Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/channelpro-defend-chicago-2026</loc>
    <lastmod>2026-05-05T02:01:09.464Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/rightscon-2026</loc>
    <lastmod>2026-05-05T02:01:08.528Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/black-hat-usa-2026</loc>
    <lastmod>2026-05-05T02:01:07.236Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cybersecurity-in-healthcare-conference-2026</loc>
    <lastmod>2026-05-03T02:00:52.742Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/delinea-virtual-customer-day-emea</loc>
    <lastmod>2026-05-03T02:00:52.382Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ibm-think-2026</loc>
    <lastmod>2026-05-02T02:00:56.805Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/extreme-connect-2026</loc>
    <lastmod>2026-05-02T02:00:56.451Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/iapp-canada-symposium-2026</loc>
    <lastmod>2026-05-02T02:00:55.902Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/usenix-symposium-on-networked-systems-design-and-implementation-nsdi-2026</loc>
    <lastmod>2026-05-02T02:00:55.550Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/nlit-summit-2026</loc>
    <lastmod>2026-05-02T02:00:54.688Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/toulouse-hacking-convention-thcon-2026</loc>
    <lastmod>2026-05-01T02:01:02.973Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/servicenow-knowledge-2026</loc>
    <lastmod>2026-05-01T02:01:02.454Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-manila-2026</loc>
    <lastmod>2026-05-01T02:01:01.917Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sans-spring-cyber-solutions-fest-2026</loc>
    <lastmod>2026-05-01T02:01:01.075Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/secure-miami-2026</loc>
    <lastmod>2026-05-01T02:01:00.561Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mysecurityevent-berlin-2026</loc>
    <lastmod>2026-05-01T02:01:00.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/supply-chain-attacks-are-exploding</loc>
    <lastmod>2026-05-01T02:00:59.517Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-attacks-are-coming-are-you-ready</loc>
    <lastmod>2026-05-01T02:00:59.160Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/corinium-ciso-fsi-singapore-2026</loc>
    <lastmod>2026-05-01T02:00:58.800Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/iapp-canada-symposium-2026-privacy-ai-governance-cybersecurity-law</loc>
    <lastmod>2026-05-01T02:00:58.187Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/jax-2026</loc>
    <lastmod>2026-05-01T02:00:57.711Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/riskworld-2026</loc>
    <lastmod>2026-05-01T02:00:56.602Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gitec-2026</loc>
    <lastmod>2026-05-01T02:00:56.226Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mindfluence-ciso-executive-leadership-forum-napa-2026</loc>
    <lastmod>2026-05-01T02:00:55.863Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/safeguard-conference-2026</loc>
    <lastmod>2026-05-01T02:00:55.218Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/national-cryptologic-foundation-s-ncf-cyber-saturday-may-2026</loc>
    <lastmod>2026-05-01T02:00:54.523Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/donversations-live-with-special-guest-mike-mathes</loc>
    <lastmod>2026-04-29T02:01:10.115Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-open-house-series</loc>
    <lastmod>2026-04-29T02:01:09.227Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/konnect-fest-2026</loc>
    <lastmod>2026-04-26T02:01:01.002Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/milipol-techx-summit-2026</loc>
    <lastmod>2026-04-26T02:01:00.247Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cybereco-cybersecurity-conference-2026</loc>
    <lastmod>2026-04-26T02:00:59.902Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdstrike-adversary-week-europe-s-threat-landscape-insights-from-the-front-lin</loc>
    <lastmod>2026-04-26T02:00:59.556Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-new-frontlines-of-code-security-defending-agentic-workflows</loc>
    <lastmod>2026-04-26T02:00:59.172Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-singapore-2026</loc>
    <lastmod>2026-04-26T02:00:58.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberx-indonesia-2026</loc>
    <lastmod>2026-04-26T02:00:58.479Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/inside-the-ai-gateway-secure-smart-and-scalable-ai-traffic-management</loc>
    <lastmod>2026-04-26T02:00:58.117Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mission-critical-ot-can-t-depend-on-the-cloud</loc>
    <lastmod>2026-04-26T02:00:57.648Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ciso-inspired-summit-uk-april-north-2026</loc>
    <lastmod>2026-04-26T02:00:57.282Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/pulse-conferences-ciso-360-uk-2026</loc>
    <lastmod>2026-04-26T02:00:56.922Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-ready-data-security-discover-classify-and-govern-data-for-safe-ai-adoption</loc>
    <lastmod>2026-04-26T02:00:56.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/proofpoint-protect-insights-santiago-2026</loc>
    <lastmod>2026-04-26T02:00:55.814Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/manageengine-userconf-turkey-2026</loc>
    <lastmod>2026-04-26T02:00:55.159Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/heimdal-labs-deep-dive-april</loc>
    <lastmod>2026-04-26T02:00:54.257Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/stareast-2026</loc>
    <lastmod>2026-04-26T02:00:53.406Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/national-cyber-crime-conference-2026</loc>
    <lastmod>2026-04-25T02:01:02.575Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/a1-digital-cybersecurity-summit-2026</loc>
    <lastmod>2026-04-25T02:01:02.182Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/def-con-singapore-2026</loc>
    <lastmod>2026-04-25T02:01:01.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cybersecurity-and-privacy-professionals-conference-2026</loc>
    <lastmod>2026-04-25T02:01:01.239Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopsdays-copenhagen-2026</loc>
    <lastmod>2026-04-25T02:01:00.863Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/identity-summit-by-socure-2026</loc>
    <lastmod>2026-04-25T02:01:00.135Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-revolution-summit-malaysia-2026</loc>
    <lastmod>2026-04-25T02:00:59.758Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-kansas-city-2026</loc>
    <lastmod>2026-04-25T02:00:59.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-cryptography-security-and-privacy-csp-2026</loc>
    <lastmod>2026-04-25T02:00:58.484Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/2026-hacktheon-sejong-international-collegiate-cybersecurity-competition</loc>
    <lastmod>2026-04-25T02:00:57.845Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/virtual-foundational-application-of-social-engineering</loc>
    <lastmod>2026-04-25T02:00:57.146Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-charm-2026</loc>
    <lastmod>2026-04-25T02:00:56.411Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-national-capital-region-security-forum-may-2026-networking</loc>
    <lastmod>2026-04-24T02:01:11.151Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sinetsilicon-valley-2026</loc>
    <lastmod>2026-04-20T02:01:00.697Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ertl-yang-leader-summit-2026-basel</loc>
    <lastmod>2026-04-20T02:01:00.140Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-warsaw-2026</loc>
    <lastmod>2026-04-20T02:00:59.686Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/passwords-aren-t-dead-yet-the-hybrid-strategy-for-a-passwordless-future</loc>
    <lastmod>2026-04-20T02:00:58.103Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/psa-tec-2026</loc>
    <lastmod>2026-04-20T02:00:57.236Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopscon-amsterdam-2026</loc>
    <lastmod>2026-04-20T02:00:56.038Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-challenges-of-3rd-party-software-risk-from-contributions-to-consumption</loc>
    <lastmod>2026-04-19T02:01:11.389Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/stop-trusting-packages-start-verifying-them-inside-the-spectra-assure-community</loc>
    <lastmod>2026-04-19T02:01:10.852Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-preventable-breach-what-a-retired-fbi-agent-learned-from-1-000-victims</loc>
    <lastmod>2026-04-19T02:01:10.325Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/quartz-network-cio-ciso-summit-2026</loc>
    <lastmod>2026-04-19T02:01:09.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/western-canada-information-security-conference-wcisc-2026</loc>
    <lastmod>2026-04-19T02:01:09.313Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/aus-gov-data-summit-2026</loc>
    <lastmod>2026-04-19T02:01:08.790Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/hmg-strategy-annual-washington-d-c-c-level-technology-leadership-summit-2026</loc>
    <lastmod>2026-04-19T02:01:08.239Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-leaders-summit-london-april-2026</loc>
    <lastmod>2026-04-19T02:01:07.686Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberuk-2026</loc>
    <lastmod>2026-04-19T02:01:07.097Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/black-hat-asia-2026</loc>
    <lastmod>2026-04-19T02:01:06.576Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/level-zero-conference-2026</loc>
    <lastmod>2026-04-19T02:01:05.978Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sans-ai-summit-solutions-track-2026</loc>
    <lastmod>2026-04-19T02:01:05.235Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/innovate-marco-island-2026</loc>
    <lastmod>2026-04-19T02:01:04.812Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/lynx-ai-security-summit-2026</loc>
    <lastmod>2026-04-19T02:01:04.115Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/expo-seguridad-m-xico-2026</loc>
    <lastmod>2026-04-17T02:01:27.018Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/design-automation-and-test-in-europe-conference-date-2026</loc>
    <lastmod>2026-04-17T02:01:14.394Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/data-center-world-2026</loc>
    <lastmod>2026-04-17T02:01:13.965Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mlcon-amsterdam-2026</loc>
    <lastmod>2026-04-17T02:01:13.558Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/privacy-symposium-2026</loc>
    <lastmod>2026-04-17T02:01:13.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/global-security-symposium-ksa-2026</loc>
    <lastmod>2026-04-17T02:01:11.715Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sparkcon-2026</loc>
    <lastmod>2026-04-17T02:01:10.138Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ctf-cit-networking-event-2026</loc>
    <lastmod>2026-04-17T02:01:09.698Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/holiday-in-scambodia-hacknwa-2026</loc>
    <lastmod>2026-04-17T02:01:09.264Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sreday-san-francisco-2026</loc>
    <lastmod>2026-04-17T02:01:08.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/beyond-cyber-compliance-turning-regulatory-gaps-into-strategic-advantages</loc>
    <lastmod>2026-04-17T02:01:08.343Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/building-a-disaster-recovery-strategy-resilience-wherever-work-lives</loc>
    <lastmod>2026-04-17T02:01:07.674Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-bangalore-2026</loc>
    <lastmod>2026-04-17T02:01:07.177Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/patch-tuesday-community-session</loc>
    <lastmod>2026-04-17T02:01:06.489Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/what-s-behind-fraud-rates-spiking-inside-the-sentilink-fraud-report</loc>
    <lastmod>2026-04-17T02:01:05.716Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-red-and-blue-teaming-summit-2026</loc>
    <lastmod>2026-04-17T02:01:05.129Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-govsummit-2026</loc>
    <lastmod>2026-04-15T02:01:18.073Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/vertical-insights-k-12-school-security-symposium</loc>
    <lastmod>2026-04-14T02:01:17.701Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/oracle-ai-world-tour-2026-singapore</loc>
    <lastmod>2026-04-13T02:01:08.252Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/fraud-fight-club-2026</loc>
    <lastmod>2026-04-13T02:01:07.725Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ians-ciso-roundtable-boston-2026</loc>
    <lastmod>2026-04-13T02:01:07.190Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/akamai-tech-day-nieuwegein-2026</loc>
    <lastmod>2026-04-13T02:01:06.701Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/shorter-tls-series-your-guide-to-c-level-buy-in</loc>
    <lastmod>2026-04-13T02:01:06.170Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/securing-your-spot-in-the-canadian-defence-supply-chain-how-to-turn-cpcsc-requir</loc>
    <lastmod>2026-04-13T02:01:05.094Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/opentext-summit-munich-2026</loc>
    <lastmod>2026-04-13T02:01:04.054Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/generative-ai-summit-2026</loc>
    <lastmod>2026-04-13T02:01:03.330Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/aiweek-2026</loc>
    <lastmod>2026-04-13T02:01:01.865Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-state-of-industrial-remote-access</loc>
    <lastmod>2026-04-12T02:01:07.303Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/introducing-the-adaptive-era-of-email-security</loc>
    <lastmod>2026-04-12T02:01:06.877Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-ambient-systems-networks-and-technologies-ant-2026</loc>
    <lastmod>2026-04-12T02:01:06.357Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/chief-information-security-officer-summit-silicon-valley</loc>
    <lastmod>2026-04-12T02:01:05.805Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/channelnext-east-2026</loc>
    <lastmod>2026-04-12T02:01:05.430Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/gds-security-insight-summit-2026</loc>
    <lastmod>2026-04-12T02:01:04.951Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/consortium-for-school-networking-cosn-2026</loc>
    <lastmod>2026-04-12T02:01:03.564Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-c2-2026</loc>
    <lastmod>2026-04-12T02:01:03.022Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/rh-isac-cybersecurity-summit-2026</loc>
    <lastmod>2026-04-12T02:01:02.408Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-current-state-of-ai-in-threat-intelligence</loc>
    <lastmod>2026-04-11T02:01:05.486Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/statewide-it-conference-2026</loc>
    <lastmod>2026-04-11T02:01:03.510Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-applied-computing-cac-2026</loc>
    <lastmod>2026-04-11T02:01:03.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/siathere-guadalajara</loc>
    <lastmod>2026-04-10T02:01:15.404Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cellebrite-c2c-user-summit-2026</loc>
    <lastmod>2026-04-10T02:01:04.586Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/fs-isac-fincyber-today-canada-2026</loc>
    <lastmod>2026-04-10T02:01:04.061Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cve-first-vulncon-annual-cna-summit-2026</loc>
    <lastmod>2026-04-10T02:01:02.699Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/so-con-2026</loc>
    <lastmod>2026-04-10T02:01:02.116Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/international-conference-on-software-engineering-icse-2026</loc>
    <lastmod>2026-04-10T02:01:01.582Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/owasp-boston-application-security-conference-basc</loc>
    <lastmod>2026-04-10T02:01:00.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/boston-application-security-conference-basc-2026</loc>
    <lastmod>2026-04-10T02:01:00.203Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-oklahoma-2026</loc>
    <lastmod>2026-04-10T02:00:59.677Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/crowdtour-mumbai-2026</loc>
    <lastmod>2026-04-10T02:00:58.869Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/security-leader-summit-5-2026</loc>
    <lastmod>2026-04-10T02:00:58.171Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/beyond-backup-the-rapid-recovery-data-readiness-series-building-a-disaster-recov</loc>
    <lastmod>2026-04-10T02:00:57.638Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/mdc-cybersecurity-hackathon-and-industry-panel</loc>
    <lastmod>2026-04-10T02:00:57.001Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/interference-ahead-why-the-security-industry-is-fighting-a-monopolistic-wireless</loc>
    <lastmod>2026-04-09T02:01:23.730Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/spm-seminar-at-psa-tec-2026</loc>
    <lastmod>2026-04-09T02:01:22.491Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/sia-national-capital-region-security-forum-april-2026-networking</loc>
    <lastmod>2026-04-09T02:01:22.195Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/donversations-live-with-special-guest-scott-elkins</loc>
    <lastmod>2026-04-09T02:01:21.142Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ertl-yang-leader-summit-2026-singapore</loc>
    <lastmod>2026-04-09T02:01:10.998Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ransomware-in-the-ai-era-what-s-real-what-s-not</loc>
    <lastmod>2026-04-09T02:01:10.516Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/learn-how-to-automate-compliance-for-soc-2-iso-27001-and-more</loc>
    <lastmod>2026-04-09T02:01:10.033Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/securing-modern-ai-applications-with-wiz-ai-app-from-code-to-runtime</loc>
    <lastmod>2026-04-09T02:01:09.572Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/the-onchain-fraud-prevention-blueprint-why-investigation-first-is-failing-digita</loc>
    <lastmod>2026-04-09T02:01:09.111Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/oracle-ai-world-tour-2026-new-york-city</loc>
    <lastmod>2026-04-09T02:01:08.611Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/devopsdays-buenos-aires-2026</loc>
    <lastmod>2026-04-09T02:01:08.025Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/achieving-misra-c-2023-compliance-with-sonar</loc>
    <lastmod>2026-04-09T02:01:07.531Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/2026-rsac-conference-recap</loc>
    <lastmod>2026-04-09T02:01:06.985Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-salt-lake-city-2026</loc>
    <lastmod>2026-04-09T02:01:06.465Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/atlseccon-2026</loc>
    <lastmod>2026-04-09T02:01:05.795Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/kernelcon-2026</loc>
    <lastmod>2026-04-09T02:01:05.255Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/app-state-cyber-summit-2026</loc>
    <lastmod>2026-04-09T02:01:04.679Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/futurecon-cybersecurity-conference-minneapolis-2026</loc>
    <lastmod>2026-04-09T02:01:04.032Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/operationalize-threat-intelligence-3-essential-integration-workflows</loc>
    <lastmod>2026-04-09T02:01:03.368Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/beyond-the-perimeter-how-to-see-every-threat-in-hybrid-networks</loc>
    <lastmod>2026-04-09T02:01:02.658Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/hipaa-in-2026-balancing-compliance-and-security-with-lean-teams</loc>
    <lastmod>2026-04-09T02:01:01.854Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cspm-review-course-may-2026</loc>
    <lastmod>2026-04-04T02:01:18.324Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/humanx-san-francisco-2026</loc>
    <lastmod>2026-04-02T11:40:07.626Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/entelec-conference-expo-2026</loc>
    <lastmod>2026-04-02T11:40:07.045Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-san-diego-2026</loc>
    <lastmod>2026-04-02T11:40:06.441Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-milwaukee-2026</loc>
    <lastmod>2026-04-02T11:40:05.799Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyera-product-spotlight-dspm-datawatcher-in-action-from-data-chaos-to-data-zen-2</loc>
    <lastmod>2026-04-02T11:40:05.253Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/vertical-insights-stadium-security-symposium</loc>
    <lastmod>2026-04-02T10:32:25.168Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/siathere-new-york-new-jersey</loc>
    <lastmod>2026-04-02T10:32:24.657Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/how-to-gain-it-ot-visibility-and-protect-uptime-with-owl-talon-data-diodes</loc>
    <lastmod>2026-04-02T10:32:13.643Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/everyone-is-deploying-ai-agents-almost-nobody-knows-what-they-re-doing</loc>
    <lastmod>2026-04-02T10:32:12.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-mussoorie-2026</loc>
    <lastmod>2026-04-02T10:32:12.056Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyera-product-spotlight-dspm-datawatcher-in-action-from-data-chaos-to-data-zen</loc>
    <lastmod>2026-04-02T10:32:11.442Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/driving-real-world-resilience-with-technical-exercising-on-immersive-one</loc>
    <lastmod>2026-04-02T10:32:11.054Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/tales-from-the-trenches</loc>
    <lastmod>2026-04-02T10:32:10.691Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ciomeet-chicago-2026</loc>
    <lastmod>2026-04-02T10:32:10.319Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/middle-east-escalation-strengthening-ot-resilience-in-a-rapidly-evolving-threat-</loc>
    <lastmod>2026-04-02T10:32:09.932Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/notiones-final-conference-2026</loc>
    <lastmod>2026-04-02T10:32:09.566Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/introducing-q-firm-android-firmware-security-testing-before-devices-ship</loc>
    <lastmod>2026-04-02T10:32:09.062Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/tracing-a-multi-vector-malware-campaign-from-vbs-to-open-infrastructure</loc>
    <lastmod>2026-04-02T10:32:08.630Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/spies-lies-and-cybercrime-building-a-scalable-cyber-resilience-strategy</loc>
    <lastmod>2026-04-02T10:32:08.225Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infostealers-your-digital-drug-dealers</loc>
    <lastmod>2026-04-02T10:32:07.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/architecting-identity-guardrails-for-agentic-ai</loc>
    <lastmod>2026-04-02T10:32:07.294Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/owasp-italy-day-2026</loc>
    <lastmod>2026-04-02T10:31:32.629Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/it-security-summit-berlin</loc>
    <lastmod>2026-04-02T10:31:31.963Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/european-open-source-security-forum</loc>
    <lastmod>2026-04-02T10:31:31.503Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/include-conf-2026</loc>
    <lastmod>2026-04-02T10:31:31.072Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/elbsides-2026</loc>
    <lastmod>2026-04-02T10:31:30.463Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/infosecurity-europe</loc>
    <lastmod>2026-04-02T10:31:29.708Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/security-fest</loc>
    <lastmod>2026-04-02T10:31:28.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/update-conference-krakow-2026</loc>
    <lastmod>2026-04-02T10:31:27.988Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/it-grc-kongress-2026</loc>
    <lastmod>2026-04-02T10:31:27.465Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/confidence-2026</loc>
    <lastmod>2026-04-02T10:31:26.934Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cysat-europe</loc>
    <lastmod>2026-04-02T10:31:25.849Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyberwisecon-europe-2026</loc>
    <lastmod>2026-04-02T10:31:25.057Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/ai-security-summit-london</loc>
    <lastmod>2026-04-02T10:31:23.321Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/bsides-groningen-2026</loc>
    <lastmod>2026-04-02T10:31:22.470Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/manageengine-roadshow-2026</loc>
    <lastmod>2026-04-02T10:31:21.720Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/cyber-threat-intelligence-conference-2026</loc>
    <lastmod>2026-04-02T10:31:20.934Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/secure-2026</loc>
    <lastmod>2026-04-02T10:31:19.583Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/events/notiones-final-conference</loc>
    <lastmod>2026-04-02T10:31:18.488Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/95fa2e67-7bcd-4c70-b063-80d78dc74624</loc>
    <lastmod>2026-04-04T15:35:46.190Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/a93a00d5-6ca2-4219-86a8-4056d5ca8cf7</loc>
    <lastmod>2026-04-04T15:35:33.077Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/tips/1934800e-de70-4ee9-a027-4d5c5858fee3</loc>
    <lastmod>2026-03-25T19:33:45.057Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/sonicwall-mfa-bypass-patched-but-still-wide-open</loc>
    <lastmod>2026-05-21T04:00:28.064Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/47-zero-days-drop-at-pwn2own-berlin</loc>
    <lastmod>2026-05-20T06:26:19.742Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/shub-reaper-spoofs-apple-updates-to-steal-everything</loc>
    <lastmod>2026-05-19T04:00:29.435Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/tycoon2fa-weaponizes-device-code-phishing-for-m365</loc>
    <lastmod>2026-05-18T04:00:24.376Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/16-year-old-nginx-flaw-now-has-public-exploit</loc>
    <lastmod>2026-05-17T04:00:31.020Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/wordpress-funnel-builder-skims-checkout-cards</loc>
    <lastmod>2026-05-16T09:47:51.653Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/burst-statistics-plugin-auth-bypass-under-mass-exploitation</loc>
    <lastmod>2026-05-15T04:00:26.654Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/critical-exim-flaw-hands-attackers-remote-code-execution</loc>
    <lastmod>2026-05-14T04:00:33.546Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/nitrogen-ransomware-hits-foxconn-claims-8tb-stolen</loc>
    <lastmod>2026-05-13T04:00:31.483Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/checkmarx-jenkins-plugin-backdoored-with-infostealer</loc>
    <lastmod>2026-05-15T11:48:04.627Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/attackers-tricked-digicert-into-signing-malware</loc>
    <lastmod>2026-05-11T04:00:25.781Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/jdownloader-site-hacked-installers-replaced-with-rat</loc>
    <lastmod>2026-05-10T04:00:25.952Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/credit-union-breach-exposes-one-million-card-numbers</loc>
    <lastmod>2026-05-09T04:00:30.858Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/shinyhunters-deface-canvas-lms-millions-exposed</loc>
    <lastmod>2026-05-08T04:00:25.458Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/pan-os-zero-day-hands-attackers-root-on-firewalls</loc>
    <lastmod>2026-05-07T04:00:30.144Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/copy-fail-gives-root-without-touching-disk</loc>
    <lastmod>2026-05-06T04:00:30.770Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/weaver-e-cology-rce-exploited-days-after-patch</loc>
    <lastmod>2026-05-05T04:00:31.989Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/shinyhunters-breaches-instructure-exposes-millions-of-students</loc>
    <lastmod>2026-05-04T06:00:23.602Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/vishing-and-sso-abuse-fuel-saas-extortion</loc>
    <lastmod>2026-05-03T10:00:22.375Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/cpanel-auth-bypass-hits-1-5-million-servers</loc>
    <lastmod>2026-05-01T08:00:27.858Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/sap-npm-packages-hijacked-to-steal-secrets</loc>
    <lastmod>2026-04-30T06:00:25.632Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/bluenoroff-weaponizes-deepfake-zoom-calls-against-crypto-execs</loc>
    <lastmod>2026-04-29T20:00:26.988Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/popular-pypi-package-hijacked-via-github-actions</loc>
    <lastmod>2026-04-28T06:01:14.831Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/entra-agent-id-flaw-hands-over-entire-tenants</loc>
    <lastmod>2026-04-27T06:00:18.650Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/snow-malware-blows-in-through-teams-chat</loc>
    <lastmod>2026-04-26T08:00:27.356Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/wormable-npm-malware-crawls-the-supply-chain</loc>
    <lastmod>2026-04-25T06:00:23.458Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/vercel-breach-spreads-beyond-initial-blast-radius</loc>
    <lastmod>2026-04-24T07:27:38.666Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/dead-routers-walk-mirai-feasts-on-d-link</loc>
    <lastmod>2026-04-24T07:33:04.861Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/french-id-agency-breach-exposes-19-million-citizens</loc>
    <lastmod>2026-04-24T07:33:06.929Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/lazarus-drains-290m-from-kelpdao</loc>
    <lastmod>2026-04-24T07:33:09.049Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/vercel-breached-shinyhunters-selling-stolen-secrets</loc>
    <lastmod>2026-04-24T07:33:59.768Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/protobuf-js-flaw-turns-schemas-into-weapons</loc>
    <lastmod>2026-04-24T07:27:49.115Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/four-android-malware-families-raid-800-banking-apps</loc>
    <lastmod>2026-04-24T07:33:13.120Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/copilot-bug-ignored-sensitivity-labels-for-weeks</loc>
    <lastmod>2026-05-15T11:57:12.500Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/nginx-ui-auth-bypass-under-active-exploitation</loc>
    <lastmod>2026-05-15T11:57:03.275Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/signed-sealed-infected-cpu-z-supply-chain-hit</loc>
    <lastmod>2026-05-15T11:56:54.597Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/show/wolfssl-flaw-lets-attackers-forge-certificates-on-billions-of-devices</loc>
    <lastmod>2026-05-15T11:56:45.364Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/github-links-repo-breach-to-tanstack-npm-supply-chain-attack-8023fe</loc>
    <lastmod>2026-05-21T08:08:46.550Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/retoswap-has-been-drained-of-7-000-xmr-2-7-million-after-a-flaw-in-the-haveno-pr-5e983d</loc>
    <lastmod>2026-05-21T00:08:59.035Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-bypass-sonicwall-vpn-mfa-due-to-incomplete-patching-d03048</loc>
    <lastmod>2026-05-20T22:09:02.997Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/perumda-tirta-musi-palembang-alleged-customer-database-sale-437k-utility-records-f7e546</loc>
    <lastmod>2026-05-20T21:09:17.008Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apd-gba-belgium-101-2026-b65f39</loc>
    <lastmod>2026-05-20T20:09:06.511Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/first-vpn-service-website-seized-by-law-enforcement-08965a</loc>
    <lastmod>2026-05-20T22:08:17.300Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rt-darkwebinformer-lapsus-group-announces-a-joint-for-sale-post-with-teampcp-for-794a24</loc>
    <lastmod>2026-05-20T17:08:45.835Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/socket-raises-60m-series-c-at-a-1b-valuation-to-secure-software-supply-chains-fo-121e20</loc>
    <lastmod>2026-05-20T17:07:33.054Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uruguay-dnic-allegedly-leaked-5-8m-citizen-database-records-exposed-33ced1</loc>
    <lastmod>2026-05-20T16:07:39.381Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uruguay-dnic-allegedly-leaked-5-8m-citizen-database-records-exposed-https-t-co-n-544c62</loc>
    <lastmod>2026-05-20T16:07:00.920Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-acknowledges-the-yellowkey-bitlocker-bypass-vulnerability-and-releases-f12b1d</loc>
    <lastmod>2026-05-20T16:07:15.180Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/github-breach-teampcp-steals-3-800-repositories-via-vs-code-extension-d10e13</loc>
    <lastmod>2026-05-20T14:06:00.019Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/verizon-dbir-ai-helped-hackers-exploit-vulnerabilities-in-31-of-recent-breaches-451b50</loc>
    <lastmod>2026-05-20T14:06:53.999Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/banana-rat-malware-in-fake-invoices-hits-customers-at-16-brazilian-banks-9adceb</loc>
    <lastmod>2026-05-20T10:05:59.828Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/github-confirms-they-were-compromised-after-an-employee-device-involving-a-poiso-559bcf</loc>
    <lastmod>2026-05-20T09:06:55.417Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-shares-mitigation-for-yellowkey-windows-zero-day-de9688</loc>
    <lastmod>2026-05-20T09:06:02.535Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/github-investigates-internal-repositories-breach-claimed-by-teampcp-9d422b</loc>
    <lastmod>2026-05-20T06:06:46.202Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-goes-after-cybersecurity-firm-warning-victims-not-to-pay-ransoms-ht-4ddba3</loc>
    <lastmod>2026-05-20T03:05:43.604Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/breach-entry-point-2026-dbir-finds-about-verizon-b1d772</loc>
    <lastmod>2026-05-19T21:05:56.704Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pwn2own-berlin-2026-closes-with-1-3-million-in-zero-day-payouts-2ee4c4</loc>
    <lastmod>2026-05-19T19:09:46.666Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-shai-hulud-malware-wave-compromises-600-npm-packages-629679</loc>
    <lastmod>2026-05-19T16:09:08.844Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/7-eleven-confirms-data-breach-claimed-by-the-shinyhunters-gang-09f3cb</loc>
    <lastmod>2026-05-19T16:09:18.285Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-actively-exploit-nginx-rift-vulnerability-affecting-nginx-f5-products-36d934</loc>
    <lastmod>2026-05-19T12:08:36.268Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interpol-operation-ramz-seizes-53-malware-phishing-servers-355beb</loc>
    <lastmod>2026-05-19T00:08:56.709Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shub-macos-infostealer-variant-spoofs-apple-security-updates-3e6a28</loc>
    <lastmod>2026-05-18T22:09:14.165Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lul-cisa-admin-leaked-aws-govcloud-keys-on-github-https-t-co-v8j07murxs-b16168</loc>
    <lastmod>2026-05-18T21:08:13.914Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/leaked-shai-hulud-malware-fuels-new-npm-infostealer-campaign-70e54c</loc>
    <lastmod>2026-05-18T18:07:25.287Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-reaper-malware-uses-fake-microsoft-domain-to-steal-macos-passwords-b36ac3</loc>
    <lastmod>2026-05-18T18:06:20.819Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grafana-says-stolen-github-token-let-hackers-steal-codebase-0e1551</loc>
    <lastmod>2026-05-18T14:06:10.358Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/millions-impacted-across-several-us-healthcare-data-breaches-286864</loc>
    <lastmod>2026-05-18T14:05:54.793Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grafana-confirms-breach-after-hackers-claim-they-stole-data-46313f</loc>
    <lastmod>2026-05-18T10:09:26.091Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/first-shai-hulud-worm-clones-emerge-07c859</loc>
    <lastmod>2026-05-18T11:08:36.187Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploitation-of-critical-nginx-vulnerability-begins-e3504e</loc>
    <lastmod>2026-05-18T08:08:46.359Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-earn-1-298-250-for-47-zero-days-at-pwn2own-berlin-2026-89f8f0</loc>
    <lastmod>2026-05-18T06:08:38.852Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-earn-1-3-million-at-pwn2own-berlin-2026-7f023c</loc>
    <lastmod>2026-05-18T07:08:26.714Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tycoon2fa-hijacks-microsoft-365-accounts-via-device-code-phishing-446b21</loc>
    <lastmod>2026-05-17T16:06:06.272Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scammers-send-physical-phishing-letters-to-steal-ledger-wallet-seed-phrases-3eefce</loc>
    <lastmod>2026-05-17T12:05:44.751Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/grafana-says-it-rejected-ransom-demand-after-source-code-theft-9a110e</loc>
    <lastmod>2026-05-17T12:05:59.258Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rdp-stealer-with-windows-defender-bypass-https-t-co-4jnuzxujmz-b2608a</loc>
    <lastmod>2026-05-17T00:05:45.350Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/poc-code-published-for-critical-nginx-vulnerability-27a500</loc>
    <lastmod>2026-05-16T12:08:45.335Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-claw-chain-vulnerabilities-put-thousands-of-openclaw-ai-servers-at-risk-078736</loc>
    <lastmod>2026-05-16T11:08:26.012Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/another-windows-zero-day-released-by-nightmare-eclipse-sort-of-it-turns-out-micr-6327af</loc>
    <lastmod>2026-05-16T08:08:24.102Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-next-cybersecurity-challenge-may-be-verifying-ai-agents-e1b78a</loc>
    <lastmod>2026-05-15T22:08:01.402Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/funnel-builder-wordpress-plugin-bug-exploited-to-steal-credit-cards-bf2184</loc>
    <lastmod>2026-05-15T20:07:57.881Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-pyinstaller-and-amsi-patching-to-deliver-xworm-rat-v7-4-7b3e57</loc>
    <lastmod>2026-05-15T19:07:51.379Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/icaro-cloud-allegedly-breached-firewall-configs-vpn-keys-tls-certificates-and-in-7e448a</loc>
    <lastmod>2026-05-15T18:07:57.829Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/openai-hit-by-tanstack-supply-chain-attack-6d47f6</loc>
    <lastmod>2026-05-15T12:09:40.966Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/calphishing-scam-uses-eviltokens-kit-outlook-invites-to-steal-m365-sessions-27fe4b</loc>
    <lastmod>2026-05-15T12:09:29.988Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-ups-the-game-releases-shai-hulud-worm-s-source-code-1dd603</loc>
    <lastmod>2026-05-15T11:37:12.791Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-hackers-advertise-mistral-ai-code-repos-for-sale-642776</loc>
    <lastmod>2026-05-15T00:09:51.305Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-ad-cs-escalation-unpacking-advanced-misuse-techniques-and-tools-034661</loc>
    <lastmod>2026-05-15T00:09:41.743Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-may-14th-2026-92ea64</loc>
    <lastmod>2026-05-14T23:09:35.155Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/maximum-severity-cisco-sd-wan-bug-exploited-in-the-wild-fa6c29</loc>
    <lastmod>2026-05-14T22:09:36.712Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-auth-bypass-flaw-in-burst-statistics-wordpress-plugin-987fbb</loc>
    <lastmod>2026-05-14T22:05:53.871Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/famoussparrow-targeted-oil-and-gas-industry-via-ms-exchange-server-exploit-1429e6</loc>
    <lastmod>2026-05-15T04:05:39.822Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kongtuke-hackers-now-use-microsoft-teams-for-corporate-breaches-1e80b9</loc>
    <lastmod>2026-05-14T14:09:59.458Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/f5-patches-over-50-vulnerabilities-9f7ebc</loc>
    <lastmod>2026-05-14T15:09:45.654Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/your-iphone-gets-stolen-then-the-hacking-begins-1d03ce</loc>
    <lastmod>2026-05-14T12:09:41.068Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kimsuky-targets-organizations-with-pebbledash-based-tools-109f90</loc>
    <lastmod>2026-05-20T07:08:30.477Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dell-confirms-its-supportassist-software-causes-windows-bsod-crashes-86c1d7</loc>
    <lastmod>2026-05-14T12:09:20.659Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-targeted-praisonai-vulnerability-hours-after-disclosure-51c3b5</loc>
    <lastmod>2026-05-14T10:07:51.933Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/high-severity-vulnerability-patched-in-vmware-fusion-3f3b97</loc>
    <lastmod>2026-05-14T10:08:00.707Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/frostyneighbor-fresh-mischief-and-digital-shenanigans-de5136</loc>
    <lastmod>2026-05-15T01:07:58.341Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges-4bf6ea</loc>
    <lastmod>2026-05-14T08:09:35.138Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researcher-drops-yellowkey-greenplasma-windows-zero-days-3e65bf</loc>
    <lastmod>2026-05-14T08:07:57.352Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-and-breachforums-launch-1-000-contest-for-supply-chain-attacks-0f2fdb</loc>
    <lastmod>2026-05-14T06:07:39.631Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-claims-sale-of-mistral-ai-repositories-amid-mini-shai-hulud-attack-f2ae58</loc>
    <lastmod>2026-05-14T02:07:43.319Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/west-pharmaceutical-says-hackers-stole-data-encrypted-systems-108c94</loc>
    <lastmod>2026-05-14T00:07:55.086Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-may-13th-2026-14aa17</loc>
    <lastmod>2026-05-14T00:05:40.190Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/security-advisories-mistral-docs-ee7f61</loc>
    <lastmod>2026-05-20T05:05:17.979Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attackers-weaponize-rubygems-for-data-dead-drops-a2878c</loc>
    <lastmod>2026-05-13T22:09:10.888Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tables-turn-on-the-gentlemen-raas-gang-with-data-leak-a0ee34</loc>
    <lastmod>2026-05-13T22:09:18.193Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-critical-exim-mailer-flaw-allows-remote-code-execution-74ce92</loc>
    <lastmod>2026-05-13T22:07:18.432Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-reaches-deal-with-shinyhunters-to-prevent-canvas-data-leak-520df9</loc>
    <lastmod>2026-05-20T20:09:24.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/foxconn-confirms-north-american-factories-hit-by-cyberattack-7e97d7</loc>
    <lastmod>2026-05-13T18:08:56.321Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-palo-alto-networks-find-many-vulnerabilities-by-using-ai-on-their-own--dd1873</loc>
    <lastmod>2026-05-13T18:09:28.717Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released-0e4efb</loc>
    <lastmod>2026-05-13T20:09:30.705Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/foxconn-has-fallen-victim-to-nitrogen-ransomware-data-8tb-over-11-million-files--25cf45</loc>
    <lastmod>2026-05-13T18:07:29.021Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ntn-bearing-corporation-of-america-allegedly-hit-by-payoutsking-ransomware-596-g-6207d6</loc>
    <lastmod>2026-05-13T18:08:11.087Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/akitatek-allegedly-breached-exposing-5-400-customer-records-from-the-french-it-s-5de279</loc>
    <lastmod>2026-05-13T17:07:31.507Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ministry-of-health-of-vietnam-allegedly-breached-exposing-480-000-medical-staff--76dd87</loc>
    <lastmod>2026-05-21T01:09:39.189Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-used-mini-shai-hulud-worm-to-poison-over-400-npm-and-pypi-packages-a831b1</loc>
    <lastmod>2026-05-13T23:09:53.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/packagist-urges-immediate-composer-update-after-github-actions-token-leak-e1f413</loc>
    <lastmod>2026-05-13T16:09:48.083Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/foxconn-confirms-cyberattack-claimed-by-nitrogen-ransomware-gang-73e540</loc>
    <lastmod>2026-05-14T03:09:53.821Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ci-fortify-cisa-8cb51f</loc>
    <lastmod>2026-05-13T14:09:26.507Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/slovakian-admin-of-dark-web-kingdom-market-jailed-for-16-years-in-us-3f8e60</loc>
    <lastmod>2026-05-13T14:09:17.624Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/716-000-impacted-by-openloop-health-data-breach-a0597f</loc>
    <lastmod>2026-05-13T12:07:01.427Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-critical-zero-click-outlook-vulnerability-threatening-enterpri-41bfbc</loc>
    <lastmod>2026-05-13T12:09:41.804Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chipmaker-patch-tuesday-intel-and-amd-patch-70-vulnerabilities-f9ddf3</loc>
    <lastmod>2026-05-13T10:06:30.722Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-ivanti-patch-critical-vulnerabilities-53fdc9</loc>
    <lastmod>2026-05-13T16:05:31.867Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bvwg-w171-2303402-1-7e-be9784</loc>
    <lastmod>2026-05-13T10:05:34.673Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hundreds-of-malicious-packages-force-rubygems-to-suspend-registrations-d09262</loc>
    <lastmod>2026-05-13T08:05:25.041Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ics-patch-tuesday-new-security-advisories-from-siemens-schneider-cisa-3f1cb4</loc>
    <lastmod>2026-05-13T08:05:42.189Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-may-12th-2026-5edb35</loc>
    <lastmod>2026-05-20T23:09:28.766Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/foxconn-ransomware-attack-shows-nothing-is-safe-forever-9050a8</loc>
    <lastmod>2026-05-13T02:09:42.493Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canvas-hackers-shinyhunters-say-their-official-domain-was-suspended-9909f3</loc>
    <lastmod>2026-05-12T22:09:43.106Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yippie-two-new-microsoft-windows-0days-the-exploits-have-cool-and-badass-mysteri-cf15a5</loc>
    <lastmod>2026-05-12T22:09:21.783Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uk-fines-water-supplier-1-3m-for-exposing-data-of-664k-customers-849dd8</loc>
    <lastmod>2026-05-12T22:07:34.185Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ohno-allegedly-breached-exposing-telegram-user-ids-crypto-wallets-and-private-ke-5e265b</loc>
    <lastmod>2026-05-21T12:09:54.356Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/signal-adds-security-warnings-for-social-engineering-phishing-attacks-899bdc</loc>
    <lastmod>2026-05-12T20:06:10.399Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-releases-windows-10-kb5087544-extended-security-update-959845</loc>
    <lastmod>2026-05-12T20:06:25.491Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fortinet-warns-of-critical-rce-flaws-in-fortisandbox-and-fortiauthenticator-b3d857</loc>
    <lastmod>2026-05-12T20:06:48.275Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-days-40079e</loc>
    <lastmod>2026-05-13T00:06:06.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-137-vulnerabilities-b1a8bb</loc>
    <lastmod>2026-05-12T20:05:41.849Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution-c50c2a</loc>
    <lastmod>2026-05-21T12:09:41.287Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-and-adobe-patch-tuesday-may-2026-security-update-review-044968</loc>
    <lastmod>2026-05-21T12:09:33.209Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-more-public-disclosures-it-will-never-stop-83f43d</loc>
    <lastmod>2026-05-12T19:09:39.303Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-claude-code-installer-targets-developers-with-browser-credential-stealer-88ef43</loc>
    <lastmod>2026-05-21T11:10:01.315Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pwn2own-berlin-2026-hits-capacity-as-rejected-hackers-release-0-days-09b58a</loc>
    <lastmod>2026-05-12T19:09:05.420Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded-bf9d58</loc>
    <lastmod>2026-05-21T11:09:52.270Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/worm-redux-fresh-mini-shai-hulud-infections-bite-supply-chain-c1107c</loc>
    <lastmod>2026-05-12T18:09:48.936Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-and-amnesty-international-teamed-up-to-make-it-harder-for-spyware-vendors-e5caca</loc>
    <lastmod>2026-05-12T18:08:01.905Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/android-17-to-expand-banking-scam-call-and-privacy-protections-12dc40</loc>
    <lastmod>2026-05-21T11:09:37.027Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/skoda-warns-of-customer-data-breach-after-online-shop-hack-ed36a2</loc>
    <lastmod>2026-05-21T10:09:56.430Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/adobe-patches-52-vulnerabilities-in-10-products-727412</loc>
    <lastmod>2026-05-12T18:06:32.500Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/futureshop-egypt-allegedly-breached-exposing-thousands-of-customer-order-and-del-921e79</loc>
    <lastmod>2026-05-21T10:09:48.929Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/public-authority-for-civil-information-allegedly-breached-exposing-5-23-million--646fa3</loc>
    <lastmod>2026-05-21T10:09:41.172Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/public-authority-for-civil-information-allegedly-breached-exposing-5-23-million--923932</loc>
    <lastmod>2026-05-21T10:09:15.432Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-private-cloud-hosted-collection-of-stealer-logs-tota-d8f877</loc>
    <lastmod>2026-05-21T09:09:58.529Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/etherrat-was-installed-via-a-malicious-msi-then-deployed-the-gentlemen-ransomwar-28f380</loc>
    <lastmod>2026-05-21T10:09:09.407Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sivvi-allegedly-breached-exposing-approximately-300-000-customer-records-from-th-f61b02</loc>
    <lastmod>2026-05-21T09:09:31.619Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/good-news-everyone-shai-hulud-that-spoopy-git-worm-thingy-everyones-been-yapping-772333</loc>
    <lastmod>2026-05-21T09:09:51.815Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-ac500-v3-stack-buffer-overflow-in-cryptographic-message-syntax-9ca9b2</loc>
    <lastmod>2026-05-21T07:09:50.546Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/subnet-solutions-powersystem-center-1a42b8</loc>
    <lastmod>2026-05-21T07:09:57.766Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-automation-builder-gateway-for-windows-43e003</loc>
    <lastmod>2026-05-21T08:09:51.405Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-webpro-snmp-card-powervalue-multiple-vulnerabilities-ea26b4</loc>
    <lastmod>2026-05-21T08:09:33.127Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-ac500-v3-multiple-vulnerabilities-55b87a</loc>
    <lastmod>2026-05-21T08:09:42.043Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fuji-electric-tellus-b679a0</loc>
    <lastmod>2026-05-21T08:09:59.144Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/undermining-the-trust-boundary-investigating-a-stealthy-intrusion-through-third--c175cd</loc>
    <lastmod>2026-05-21T07:09:42.909Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hugging-face-packages-weaponized-with-a-single-file-tweak-9298b3</loc>
    <lastmod>2026-05-12T16:05:42.473Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bwh-hotels-says-hackers-had-access-to-reservation-data-for-6-months-667666</loc>
    <lastmod>2026-05-12T16:05:29.408Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/olg-stuttgart-4-u-353-24-1da7a8</loc>
    <lastmod>2026-05-21T07:09:26.701Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bvwg-w171-2303402-1-7e-45b6bb</loc>
    <lastmod>2026-05-21T06:09:35.958Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ap-the-netherlands-2025-005323-7249c9</loc>
    <lastmod>2026-05-21T07:09:16.664Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nightmare-eclipse-has-just-released-two-new-github-repositories-same-user-behind-7f8fb6</loc>
    <lastmod>2026-05-21T05:09:49.766Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mbet-allegedly-breached-exposing-200-000-kyc-documents-and-300-000-pii-records-f-6d778f</loc>
    <lastmod>2026-05-21T05:10:00.872Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-responder-forces-a-netbios-election-and-wins-https-t-co-wihk8u3okm-8654c6</loc>
    <lastmod>2026-05-12T15:05:45.094Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots-ea160e</loc>
    <lastmod>2026-05-21T05:09:40.494Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/free-onlyfans-lure-used-to-spread-cross-platform-crpx0-malware-01328c</loc>
    <lastmod>2026-05-12T14:09:39.118Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/deal-reached-with-hackers-to-delete-data-stolen-from-the-canvas-educational-plat-6b5502</loc>
    <lastmod>2026-05-12T14:09:47.703Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/west-pharmaceutical-services-hit-by-disruptive-ransomware-attack-cb5f9b</loc>
    <lastmod>2026-05-12T14:10:04.482Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-patches-dozens-of-vulnerabilities-in-macos-ios-e44139</loc>
    <lastmod>2026-05-12T16:09:49.945Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-patches-critical-s-4hana-commerce-vulnerabilities-f95029</loc>
    <lastmod>2026-05-12T17:10:06.152Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shai-hulud-attack-ships-signed-malicious-tanstack-mistral-npm-packages-a6001f</loc>
    <lastmod>2026-05-12T12:09:58.937Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-fixes-critical-vulnerabilities-in-commerce-cloud-and-s-4hana-086a27</loc>
    <lastmod>2026-05-12T13:09:06.748Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tanstack-mistral-ai-uipath-hit-in-fresh-supply-chain-attack-a9c42e</loc>
    <lastmod>2026-05-12T16:09:07.897Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ap-the-netherlands-2025-005323-a401f2</loc>
    <lastmod>2026-05-21T03:10:01.786Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ap-the-netherlands-2025-005323-1ecc1d</loc>
    <lastmod>2026-05-21T03:09:52.862Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/operation-humanitarianbait-uses-fake-aid-documents-to-deploy-python-spyware-b21426</loc>
    <lastmod>2026-05-12T12:08:56.480Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-agentic-ai-is-security-s-next-blind-spot-167302</loc>
    <lastmod>2026-05-21T03:09:44.258Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-linux-vulnerability-schneier-on-security-f6956d</loc>
    <lastmod>2026-05-21T03:09:36.774Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-732-bytes-to-root-f6e2bc</loc>
    <lastmod>2026-05-21T03:09:28.569Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-reaches-agreement-with-shinyhunters-to-stop-data-leak-ca69ec</loc>
    <lastmod>2026-05-12T10:07:31.074Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/following-the-initial-report-from-wiz-io-on-compromised-mistralai-packages-our-a-0eb22e</loc>
    <lastmod>2026-05-21T02:09:19.860Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/state-of-ransomware-in-2026-75f428</loc>
    <lastmod>2026-05-12T08:07:00.735Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ios-26-5-brings-default-end-to-end-encrypted-rcs-messaging-between-iphone-and-an-e063ab</loc>
    <lastmod>2026-05-21T01:10:01.023Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-lea-bf4145</loc>
    <lastmod>2026-05-21T01:09:46.609Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-valida-db295b</loc>
    <lastmod>2026-05-21T01:09:54.496Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pressure-mounts-on-canvas-as-data-leak-extortion-deadline-looms-e7bcc3</loc>
    <lastmod>2026-05-20T20:09:48.888Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ghostlock-tool-abuses-windows-api-to-block-file-access-017c77</loc>
    <lastmod>2026-05-12T03:09:47.278Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gm-agrees-to-12-75m-california-settlement-over-sale-of-drivers-data-350f52</loc>
    <lastmod>2026-05-12T01:09:53.052Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/official-checkmarx-jenkins-package-compromised-with-infostealer-b54543</loc>
    <lastmod>2026-05-12T02:10:02.887Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-says-hackers-used-ai-to-develop-a-zero-day-exploit-21c114</loc>
    <lastmod>2026-05-14T09:10:03.836Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-may-11th-2026-f920ea</loc>
    <lastmod>2026-05-12T00:09:41.298Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kementerian-kesehatan-republik-indonesia-allegedly-leaked-exposing-20-million-an-3eeff4</loc>
    <lastmod>2026-05-21T01:09:17.879Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/airdc-advertised-as-ai-powered-hidden-remote-desktop-control-tool-for-windows-ta-dabad7</loc>
    <lastmod>2026-05-21T00:09:59.860Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kams-paris-allegedly-breached-exposing-187-927-customer-records-from-the-french--363d6f</loc>
    <lastmod>2026-05-21T00:09:52.871Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/customer-data-exposure-at-cb-financial-services-cbfv-prompts-material-cybersecur-421e4f</loc>
    <lastmod>2026-05-20T23:09:58.306Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/la-suite-numerique-allegedly-breached-exposing-over-18-million-records-from-the--5446d5</loc>
    <lastmod>2026-05-11T23:09:45.017Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-a-f69a53</loc>
    <lastmod>2026-05-20T23:10:06.589Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/emergia-contact-center-allegedly-breached-exposing-12-tb-of-data-from-the-colomb-c76c2a</loc>
    <lastmod>2026-05-11T19:09:44.860Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros-818e1c</loc>
    <lastmod>2026-05-11T18:09:28.205Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-bls-international-allegedly-breached-exposing-29-million-records-source-code-3cad8f</loc>
    <lastmod>2026-05-20T22:10:05.320Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation-5a38a1</loc>
    <lastmod>2026-05-20T22:09:50.675Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor-c431a6</loc>
    <lastmod>2026-05-21T07:08:58.522Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-s-threat-intelligence-group-has-documented-what-it-describes-as-the-first-ee0fed</loc>
    <lastmod>2026-05-20T21:10:00.368Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interlab-allegedly-breached-exposing-data-from-30-mexican-laboratories-via-compr-3e66b5</loc>
    <lastmod>2026-05-20T21:09:54.235Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-confirms-hackers-used-canvas-flaw-to-deface-portals-265210</loc>
    <lastmod>2026-05-11T16:10:03.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/build-application-firewalls-aim-to-stop-the-next-supply-chain-attack-f9fee7</loc>
    <lastmod>2026-05-11T21:09:08.340Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/possible-shinyhunters-clearnet-domain-seizure-as-of-about-7-hours-ago-detected-b-0d1bd0</loc>
    <lastmod>2026-05-11T16:09:26.370Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/flash-alert-etherrat-and-tuktuk-c2-end-in-the-gentleman-ransomware-in-april-we-o-7e8aec</loc>
    <lastmod>2026-05-20T20:10:01.243Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyber-espionage-group-targets-aviation-firms-to-steal-map-data-833eb0</loc>
    <lastmod>2026-05-11T15:09:26.657Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-spotted-an-ai-developed-zero-day-before-attackers-could-use-it-b550a6</loc>
    <lastmod>2026-05-11T15:09:12.902Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-changing-passwords-doesn-t-end-an-active-directory-breach-ecea65</loc>
    <lastmod>2026-05-11T14:07:25.306Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool-a403f0</loc>
    <lastmod>2026-05-11T15:06:37.050Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-detects-first-ai-generated-zero-day-exploit-e7aa31</loc>
    <lastmod>2026-05-11T14:07:15.621Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/9-year-old-dirty-frag-vulnerability-enables-root-access-on-linux-systems-05fe8f</loc>
    <lastmod>2026-05-11T14:06:42.791Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/skoda-data-breach-hits-online-shop-customers-256de9</loc>
    <lastmod>2026-05-20T19:09:51.410Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-vercel-genai-to-mass-produce-convincing-phishing-sites-9e0dac</loc>
    <lastmod>2026-05-11T12:06:06.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/your-purple-team-isn-t-purple-it-s-just-red-and-blue-in-the-same-room-85028d</loc>
    <lastmod>2026-05-20T19:09:44.836Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms-fc9693</loc>
    <lastmod>2026-05-11T10:05:35.733Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-jenkins-ast-plugin-compromised-in-supply-chain-attack-cf2222</loc>
    <lastmod>2026-05-20T19:09:18.233Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-dirty-frag-linux-vulnerability-possibly-exploited-in-attacks-a58382</loc>
    <lastmod>2026-05-20T19:09:35.958Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canvas-system-is-online-after-a-cyberattack-disrupted-thousands-of-schools-461a13</loc>
    <lastmod>2026-05-20T19:09:26.850Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads-7f9a30</loc>
    <lastmod>2026-05-20T18:10:03.086Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-analyzed-heartflabrace-doubao-claw-a-malicious-ai-skill-posing-as-a-volcengin-e73670</loc>
    <lastmod>2026-05-20T18:09:53.643Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/resurrected-crimenetwork-marketplace-taken-down-administrator-arrested-10426f</loc>
    <lastmod>2026-05-11T09:09:58.530Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-500-organizations-hit-in-years-long-phishing-campaign-6a0646</loc>
    <lastmod>2026-05-11T04:09:34.744Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lapsus-group-has-leaked-the-data-of-vodafone-https-t-co-leyjosctp6-cbb713</loc>
    <lastmod>2026-05-10T21:08:03.079Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iran-nuclear-allegedly-breached-with-77-56-gb-of-data-threatened-for-release-und-993f0f</loc>
    <lastmod>2026-05-20T18:09:35.516Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-us-men-jailed-for-helping-north-korean-hackers-infiltrate-us-firms-816c64</loc>
    <lastmod>2026-05-10T20:08:14.999Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/badc-allegedly-breached-exposing-full-private-git-repo-from-bangladesh-agricultu-2b94b2</loc>
    <lastmod>2026-05-10T20:08:03.670Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/indonesian-ministry-of-transportation-dishub-allegedly-breached-exposing-93gb-of-20367b</loc>
    <lastmod>2026-05-20T17:09:53.786Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-abuse-google-ads-claude-ai-chats-to-push-mac-malware-b72e55</loc>
    <lastmod>2026-05-15T17:07:45.653Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-trick-digicert-into-issuing-certificates-used-to-sign-malware-c87b0b</loc>
    <lastmod>2026-05-10T18:05:41.598Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/9-500-passport-and-national-id-card-scans-allegedly-being-sold-mainly-from-franc-4f46fd</loc>
    <lastmod>2026-05-20T16:09:57.398Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mansoura-university-allegedly-breached-exposing-10gb-of-student-data-research-an-4511fb</loc>
    <lastmod>2026-05-20T16:09:50.052Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak-c84897</loc>
    <lastmod>2026-05-20T15:10:04.918Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-hijack-jdownloader-site-to-deliver-malware-through-installers-c1cdb0</loc>
    <lastmod>2026-05-20T15:09:50.547Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/arup-group-allegedly-breached-by-fulcrumsec-exposing-700gb-of-github-repos-and-2-2b278a</loc>
    <lastmod>2026-05-20T15:09:41.896Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/carepoint-health-allegedly-listed-on-genesis-ransomware-leak-site-with-70gb-coun-181c08</loc>
    <lastmod>2026-05-20T15:09:34.639Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware-b81fa3</loc>
    <lastmod>2026-05-09T20:05:49.161Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-bls-international-allegedly-breached-exposing-29-million-records-source-code-effba9</loc>
    <lastmod>2026-05-20T14:10:02.169Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/saludsa-allegedly-breached-exposing-35k-medical-records-and-employee-access-from-b30dbe</loc>
    <lastmod>2026-05-09T18:09:02.308Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/compass-imaging-amp-lab-allegedly-breached-exposing-10k-positive-hiv-syphilis-an-1e737e</loc>
    <lastmod>2026-05-20T14:09:44.426Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-openai-repository-on-hugging-face-pushes-infostealer-malware-084216</loc>
    <lastmod>2026-05-09T16:06:04.549Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackable-robot-lawn-mower-unlocks-a-new-nightmare-cca7a0</loc>
    <lastmod>2026-05-09T12:05:52.073Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dirty-frag-using-the-page-caches-as-an-attack-surface-36be4f</loc>
    <lastmod>2026-05-20T14:09:37.860Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now-bbcca5</loc>
    <lastmod>2026-05-21T00:08:52.102Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/houghton-mifflin-harcourt-company-has-been-added-to-the-shinyhunters-pay-or-leak-5ef390</loc>
    <lastmod>2026-05-09T03:05:40.801Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-major-claim-saime-saren-and-carnet-fronterizo-allegedly-breached-exposing-35-0a6727</loc>
    <lastmod>2026-05-20T13:09:48.020Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-claims-second-attack-against-instructure-3b3bd4</loc>
    <lastmod>2026-05-08T22:05:39.391Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-macos-troubleshooting-sites-used-to-steal-icloud-data-in-clickfix-scam-44a2d3</loc>
    <lastmod>2026-05-20T13:09:05.464Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dirty-frag-cve-2026-43284-cve-2026-43500-patches-released-9d37b3</loc>
    <lastmod>2026-05-20T13:09:40.959Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dirty-frag-a-universal-linux-local-privilege-escalation-via-page-cache-write-pri-e57a31</loc>
    <lastmod>2026-05-20T13:09:22.987Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk-50905a</loc>
    <lastmod>2026-05-20T15:09:00.886Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-wo-71e1d3</loc>
    <lastmod>2026-05-20T12:09:54.599Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-observed-a-phishing-campaign-pivot-to-evade-static-analysis-shifting-from-cre-7e922a</loc>
    <lastmod>2026-05-20T12:09:46.110Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/preferred-hotels-amp-resorts-allegedly-breached-exposing-450-000-high-net-worth--47f6fd</loc>
    <lastmod>2026-05-08T19:09:30.776Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomware-negotiator-tied-to-56m-in-attacks-was-sentenced-dprk-linked-fraudulen-ca0709</loc>
    <lastmod>2026-05-20T12:09:24.377Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-602ea8</loc>
    <lastmod>2026-05-20T10:09:43.983Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users-bd0fed</loc>
    <lastmod>2026-05-20T12:09:17.245Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-call-history-apps-stole-payments-from-users-after-7-3-million-play-store-do-23ac7e</loc>
    <lastmod>2026-05-20T11:09:59.296Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-169-australian-websites-allegedly-being-sold-as-full-panel-access-by-a-single--731b26</loc>
    <lastmod>2026-05-20T11:09:50.548Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/security-incident-update-faqs-5fe463</loc>
    <lastmod>2026-05-08T18:09:32.442Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/meetic-allegedly-leaked-exposing-7-million-user-records-from-the-french-online-d-904e1c</loc>
    <lastmod>2026-05-08T17:10:07.033Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/meetic-allegedly-leaked-exposing-7-million-user-records-from-the-french-online-d-33fd1f</loc>
    <lastmod>2026-05-08T17:09:59.256Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cashea-allegedly-re-leaked-exposing-79-million-transaction-records-from-the-vene-8996fd</loc>
    <lastmod>2026-05-20T11:09:31.751Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-has-updated-their-security-incident-page-with-further-information-ht-8ee6fa</loc>
    <lastmod>2026-05-20T11:09:38.430Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-train-hacker-arrested-pamdoora-linux-backdoor-new-cisa-director-fr-7d43a1</loc>
    <lastmod>2026-05-20T11:09:19.319Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ldlc-allegedly-leaked-exposing-1-5-million-customer-records-from-the-french-tech-02dbdb</loc>
    <lastmod>2026-05-08T17:09:26.909Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/community-choice-credit-union-allegedly-breached-exposing-1m-premium-credit-clie-698897</loc>
    <lastmod>2026-05-08T16:09:57.425Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/credilink-allegedly-breached-exposing-243-million-records-from-the-brazilian-cre-c14e9a</loc>
    <lastmod>2026-05-08T16:09:49.801Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/credilink-allegedly-breached-exposing-243-million-records-from-the-brazilian-cre-f277c1</loc>
    <lastmod>2026-05-08T16:09:13.348Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ldlc-allegedly-leaked-exposing-1-5-million-customer-records-from-the-french-tech-d2441f</loc>
    <lastmod>2026-05-08T16:09:19.610Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/community-choice-credit-union-allegedly-breached-exposing-1m-premium-credit-clie-298904</loc>
    <lastmod>2026-05-20T10:09:55.778Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dirty-frag-is-a-linux-lpe-case-worth-watching-closely-it-chains-two-page-cache-w-c9a24b</loc>
    <lastmod>2026-05-20T10:09:50.462Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-uncovered-a-new-brazilian-banking-trojan-campaign-tclbanker-what-makes-tclban-48df2b</loc>
    <lastmod>2026-05-08T14:10:06.339Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-source-code-breach-claimed-by-ransomhouse-hackers-88cf53</loc>
    <lastmod>2026-05-08T14:06:47.076Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day-c3640f</loc>
    <lastmod>2026-05-08T14:07:00.867Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-claims-nearly-9-000-schools-affected-by-canvas-data-breach-602238</loc>
    <lastmod>2026-05-08T14:06:23.839Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/flaw-in-claude-s-chrome-extension-allowed-any-other-plugin-to-hijack-victims-ai-72fb6b</loc>
    <lastmod>2026-05-08T14:06:38.582Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claudebleed-vulnerability-lets-hackers-hijack-claude-chrome-extension-to-steal-d-2767ad</loc>
    <lastmod>2026-05-08T14:06:08.638Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromi-06209b</loc>
    <lastmod>2026-05-20T09:09:39.187Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk-e4d796</loc>
    <lastmod>2026-05-20T10:09:25.144Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials-aa100f</loc>
    <lastmod>2026-05-20T09:09:56.810Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants-3e9e83</loc>
    <lastmod>2026-05-08T12:05:59.754Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach-08af90</loc>
    <lastmod>2026-05-08T12:06:07.684Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyberattack-hits-canvas-system-used-by-thousands-of-schools-as-finals-loom-6bf774</loc>
    <lastmod>2026-05-08T12:06:17.688Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pentest-tools-com-releases-free-scanner-for-cve-2026-41940-as-cpanel-authenticat-a77388</loc>
    <lastmod>2026-05-20T08:10:04.300Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zara-data-breach-exposed-personal-information-of-197-000-people-b2cdd6</loc>
    <lastmod>2026-05-08T12:05:25.154Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pcpjack-worm-removes-teampcp-infections-steals-credentials-0c830d</loc>
    <lastmod>2026-05-10T21:05:18.553Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202408867-84e691</loc>
    <lastmod>2026-05-20T08:09:44.997Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/former-govt-contractor-convicted-for-wiping-dozens-of-federal-databases-4328b9</loc>
    <lastmod>2026-05-08T10:10:01.745Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp-191ad6</loc>
    <lastmod>2026-05-08T10:09:53.181Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-got-access-to-canvas-infrastructure-from-vishing-social-engineering-c48873</loc>
    <lastmod>2026-05-08T09:09:37.210Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomware-group-takes-credit-for-trellix-hack-c31c55</loc>
    <lastmod>2026-05-08T08:09:55.080Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerability-in-claude-extension-for-chrome-exposes-ai-agent-to-takeover-78ba37</loc>
    <lastmod>2026-05-08T08:10:03.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros-5e985d</loc>
    <lastmod>2026-05-08T08:09:44.374Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributio-30edb1</loc>
    <lastmod>2026-05-20T07:09:52.487Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-canvas-hack-is-a-new-kind-of-ransomware-debacle-6a3382</loc>
    <lastmod>2026-05-08T06:09:49.060Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-patches-epmm-zero-day-exploited-in-targeted-attacks-6514c2</loc>
    <lastmod>2026-05-08T16:09:29.637Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canvas-breach-disrupts-schools-colleges-nationwide-71d567</loc>
    <lastmod>2026-05-20T06:09:58.162Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-status-4a728d</loc>
    <lastmod>2026-05-08T03:09:25.317Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-defaces-canvas-lms-portal-thousands-of-universities-affected-2b80bc</loc>
    <lastmod>2026-05-08T01:09:33.751Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/indian-real-estate-firm-allegedly-being-sold-as-azure-ad-server-admin-access-a-t-aedff8</loc>
    <lastmod>2026-05-08T00:10:01.360Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-threat-brief-cve-2026-0300-a-buffer-overflow-vulnerability-in-the-pan-os-use-66a8ac</loc>
    <lastmod>2026-05-20T06:09:43.804Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canvas-login-portals-hacked-in-mass-shinyhunters-extortion-campaign-a56f93</loc>
    <lastmod>2026-05-08T00:07:16.398Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-tclbanker-malware-self-spreads-over-whatsapp-and-outlook-6dd857</loc>
    <lastmod>2026-05-08T01:07:20.777Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/here-is-the-list-of-every-school-district-college-and-university-impacted-by-the-605386</loc>
    <lastmod>2026-05-07T23:06:48.104Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-prompts-become-shells-rce-vulnerabilities-in-ai-agent-frameworks-1f0439</loc>
    <lastmod>2026-05-20T05:10:00.515Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/after-replacing-teampcp-malware-pcpjack-steals-cloud-secrets-64c5da</loc>
    <lastmod>2026-05-07T22:06:34.766Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-customers-confront-yet-another-actively-exploited-zero-day-6d980e</loc>
    <lastmod>2026-05-20T23:08:56.466Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-compromised-canvas-to-a-currently-unknown-extent-which-resulted-in--3b5029</loc>
    <lastmod>2026-05-19T20:09:56.795Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-fake-claude-ai-site-to-infect-users-with-new-beagle-malware-3a8dcb</loc>
    <lastmod>2026-05-08T15:06:34.825Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/users-of-instructure-are-currently-logging-into-canvas-with-a-shinyhunters-messa-def6a8</loc>
    <lastmod>2026-05-07T21:05:17.532Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/deezer-allegedly-leaked-exposing-2-5-million-russian-user-records-from-the-frenc-5315da</loc>
    <lastmod>2026-05-07T21:06:14.650Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/australia-warns-of-clickfix-attacks-pushing-vidar-stealer-malware-21b7b8</loc>
    <lastmod>2026-05-13T03:10:06.929Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pcpjack-credential-stealer-exploits-5-cves-to-spread-worm-like-across-cloud-syst-69dabe</loc>
    <lastmod>2026-05-20T06:09:29.618Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-acces-dc3fb0</loc>
    <lastmod>2026-05-19T05:09:54.652Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ransomhouse-has-claimed-trellix-https-t-co-ohogpcoq3d-https-t-co-ijuvrfcvz9-636ca4</loc>
    <lastmod>2026-05-13T02:10:04.667Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lab52-released-a-paper-on-apt29-and-suspected-state-sponsored-computer-espionage-958074</loc>
    <lastmod>2026-05-13T03:09:49.098Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-warns-of-new-epmm-zero-day-exploited-using-credentials-stolen-in-january--e9ccc0</loc>
    <lastmod>2026-05-18T11:10:00.055Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/multiple-chilean-cl-websites-allegedly-being-sold-as-access-by-pharaoh-s-team-ma-7b4c01</loc>
    <lastmod>2026-05-10T10:10:05.133Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-warns-of-new-epmm-zero-day-exploited-using-credentials-stolen-in-january--12dffb</loc>
    <lastmod>2026-05-10T12:10:05.003Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-acf8a2</loc>
    <lastmod>2026-05-07T18:09:40.241Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/maxhub-pivot-client-application-cd5929</loc>
    <lastmod>2026-05-07T18:09:48.778Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/homes-real-estate-platform-allegedly-leaked-exposing-7-million-agent-and-investo-58cf69</loc>
    <lastmod>2026-05-07T17:09:33.980Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pcpjack-cloud-worm-evicts-teampcp-and-steals-credentials-at-scale-5895bb</loc>
    <lastmod>2026-05-07T17:09:16.967Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/what-pcpjack-does-after-it-wins-the-turf-war-steals-cloud-credentials-across-aws-c3ca3a</loc>
    <lastmod>2026-05-07T17:07:54.493Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-are-in-a-turf-war-for-ownership-of-your-infrastructure-labssentine-ac0e4a</loc>
    <lastmod>2026-05-07T17:08:26.037Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researcher-shows-edge-browser-stores-saved-passwords-in-plaintext-315eaf</loc>
    <lastmod>2026-05-07T16:06:46.119Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks-b3f7a2</loc>
    <lastmod>2026-05-17T22:09:54.075Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-non-emergency-medical-transport-network-allegedly-breached-exposing-500k-pati-664712</loc>
    <lastmod>2026-05-12T09:10:01.316Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/antel-tuid-digital-allegedly-breached-exposing-8gb-of-data-from-the-uruguayan-st-4b4c08</loc>
    <lastmod>2026-05-07T16:06:36.851Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-non-emergency-medical-transport-network-allegedly-breached-exposing-500k-pati-9bef30</loc>
    <lastmod>2026-05-07T16:08:03.424Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/antel-tuid-digital-allegedly-breached-exposing-8gb-of-data-from-the-uruguayan-st-317da4</loc>
    <lastmod>2026-05-07T16:08:09.061Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-zero-day-exploited-in-campaign-bearing-hallmarks-of-chinese-state-hack-e67168</loc>
    <lastmod>2026-05-07T16:07:09.667Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-code-oauth-tokens-can-be-stolen-through-stealthy-mcp-hijacking-eb2ef5</loc>
    <lastmod>2026-05-07T16:07:43.838Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chrome-148-rolls-out-with-127-security-fixes-0775ae</loc>
    <lastmod>2026-05-07T16:07:52.905Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/that-ai-extension-helping-you-write-emails-it-s-reading-them-first-4b2ec5</loc>
    <lastmod>2026-05-07T15:06:48.843Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/laboratorios-ceflo-allegedly-breached-exposing-21k-positive-hiv-syphilis-and-cov-a9912b</loc>
    <lastmod>2026-05-12T07:10:04.359Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/belgian-sports-fitness-chain-allegedly-breached-exposing-105k-customer-records-w-fb56c4</loc>
    <lastmod>2026-05-12T07:09:55.185Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/laboratorios-ceflo-allegedly-breached-exposing-21k-positive-hiv-syphilis-and-cov-8c9d63</loc>
    <lastmod>2026-05-07T15:08:40.664Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/belgian-sports-fitness-chain-allegedly-breached-exposing-105k-customer-records-w-a7b76c</loc>
    <lastmod>2026-05-07T15:08:47.709Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actors-leverage-llms-to-accelerate-development-of-malicious-browser-exten-6bdfb6</loc>
    <lastmod>2026-05-07T15:08:54.473Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/american-duo-sentenced-for-hosting-laptop-farms-for-north-korean-it-workers-b2f210</loc>
    <lastmod>2026-05-07T14:09:45.690Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/americans-sentenced-for-running-laptop-farms-for-north-korea-07800f</loc>
    <lastmod>2026-05-07T14:08:47.336Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-edge-plaintext-passwords-ics-0-days-patch-or-die-alerts-and--2f7a3d</loc>
    <lastmod>2026-05-11T23:10:05.296Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pan-os-rce-exploit-under-active-use-enabling-root-access-and-espionage-ca4281</loc>
    <lastmod>2026-05-11T23:09:54.980Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attackers-could-exploit-ai-vision-models-using-imperceptible-image-changes-31ab33</loc>
    <lastmod>2026-05-07T14:08:18.973Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vendor-says-daemon-tools-supply-chain-attack-contained-ca687a</loc>
    <lastmod>2026-05-07T14:08:29.293Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-coding-agents-could-fuel-next-supply-chain-crisis-031f1c</loc>
    <lastmod>2026-05-07T14:08:39.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/world-password-day-2026-the-credential-crisis-hasn-t-gone-away-it-s-just-got-mor-13a614</loc>
    <lastmod>2026-05-11T17:10:01.548Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trustfall-convention-exposes-claude-code-execution-risk-46fb20</loc>
    <lastmod>2026-05-07T14:08:09.544Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/looks-the-outlook-web-app-of-mpumalanga-department-of-social-development-a-provi-236089</loc>
    <lastmod>2026-05-07T13:07:12.189Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/thousands-of-vibe-coded-apps-expose-corporate-and-personal-data-on-the-open-web-dda907</loc>
    <lastmod>2026-05-07T12:08:12.871Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-patches-high-severity-vulnerabilities-in-enterprise-products-94beed</loc>
    <lastmod>2026-05-07T12:07:55.828Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gemini-cli-vulnerability-could-have-led-to-code-execution-supply-chain-attack-63c86a</loc>
    <lastmod>2026-05-07T12:08:04.487Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-chrome-accused-of-silently-installing-4gb-ai-model-on-user-devices-1ae03f</loc>
    <lastmod>2026-05-07T12:07:17.101Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-outdated-maintenance-software-is-a-growing-ransomware-risk-d01504</loc>
    <lastmod>2026-05-07T12:07:25.678Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scammers-use-hidden-text-to-bypass-ai-email-filters-in-phishing-scams-8eddd5</loc>
    <lastmod>2026-05-07T12:07:34.941Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-firewall-zero-day-exploited-for-nearly-a-month-8d93ec</loc>
    <lastmod>2026-05-07T12:06:59.450Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-claude-ai-website-delivers-new-beagle-windows-malware-c6cfec</loc>
    <lastmod>2026-05-07T20:07:15.187Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pypi-packages-deliver-zichatbot-malware-via-zulip-apis-on-windows-and-linux-c425e1</loc>
    <lastmod>2026-05-11T06:10:01.729Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/another-day-another-suspicious-whql-signed-driver-we-identified-a-signed-sample--542462</loc>
    <lastmod>2026-05-07T10:06:51.858Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion-c56b25</loc>
    <lastmod>2026-05-07T08:09:20.383Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/moreideas-general-trading-allegedly-re-leaked-exposing-787-217-student-records-f-f7d5bb</loc>
    <lastmod>2026-05-07T00:06:41.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-may-6th-2026-d02042</loc>
    <lastmod>2026-05-10T10:09:56.661Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing-9cc5e6</loc>
    <lastmod>2026-05-06T22:07:44.521Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mirai-based-xlabs-v1-botnet-exploits-adb-to-hijack-iot-devices-for-ddos-attacks-3a5aed</loc>
    <lastmod>2026-05-19T15:09:29.634Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yet-another-way-to-bypass-google-chrome-s-encryption-protection-bbbb5b</loc>
    <lastmod>2026-05-06T22:07:27.244Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-breach-exposes-schools-vendor-dependence-91b5b7</loc>
    <lastmod>2026-05-06T22:07:34.706Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dod-contractor-s-api-flaw-exposed-military-course-data-and-service-member-reco-b0ae0a</loc>
    <lastmod>2026-05-06T22:07:20.567Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/leroy-merlin-france-allegedly-leaked-exposing-367-462-loyalty-program-records-a--117492</loc>
    <lastmod>2026-05-06T22:05:54.564Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/transmitenota-allegedly-leaked-exposing-20-million-records-from-the-brazilian-e--991292</loc>
    <lastmod>2026-05-06T22:06:00.604Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-this-wired-video-about-fast16-a-greenberg-walks-through-the-whole-arc-a-2005--04aec2</loc>
    <lastmod>2026-05-06T22:06:36.743Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-fixes-cvss-10-gemini-cli-vulnerability-enabling-github-issue-based-rce-77b18f</loc>
    <lastmod>2026-05-06T22:05:17.904Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nrj-mobile-allegedly-leaked-exposing-266k-customer-records-from-the-french-mvno--85a0a8</loc>
    <lastmod>2026-05-06T21:06:07.535Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts-d07794</loc>
    <lastmod>2026-05-06T20:09:43.351Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices-7f7e51</loc>
    <lastmod>2026-05-06T21:09:39.598Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-critical-palo-alto-pan-os-zero-day-is-being-exploited-in-the-wild-d0e08b</loc>
    <lastmod>2026-05-06T20:09:34.447Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-argentine-government-and-https-t-co-0cuzke1ybc-allegedly-breached-exposing-8-2cc5d3</loc>
    <lastmod>2026-05-06T20:09:18.668Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nimrod-stealer-source-code-allegedly-shared-on-a-hacking-forum-for-credential-an-652ed4</loc>
    <lastmod>2026-05-06T20:08:16.563Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cacpe-pastaza-allegedly-breached-exposing-18-million-ecuadorian-civil-registry-r-8fdf3a</loc>
    <lastmod>2026-05-06T20:08:23.730Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-c2651e</loc>
    <lastmod>2026-05-06T20:08:08.485Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cloudz-rat-a-stealthy-new-trojan-hijacks-microsoft-phone-link-to-steal-your-sms--5cec9d</loc>
    <lastmod>2026-05-06T19:08:13.132Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cloudz-rat-a-stealthy-new-trojan-hijacks-microsoft-phone-link-to-steal-your-sms--b4d902</loc>
    <lastmod>2026-05-06T19:07:58.101Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nuclei-template-for-fingerprinting-the-pan-os-cve-2026-0300-zero-day-https-t-co--a39e62</loc>
    <lastmod>2026-05-06T19:07:50.890Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daemon-tools-devs-confirm-breach-release-malware-free-version-4e8fc4</loc>
    <lastmod>2026-05-06T18:08:03.312Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/clickfix-campaign-uses-fake-macos-utilities-lures-to-deliver-infostealers-d08e65</loc>
    <lastmod>2026-05-10T07:07:33.091Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-apache-http-2-double-free-flaw-enables-denial-of-service-and-potential--395037</loc>
    <lastmod>2026-05-06T18:06:53.349Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-apache-http-2-double-free-flaw-enables-denial-of-service-and-potential--15ec5c</loc>
    <lastmod>2026-05-06T18:06:29.577Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-instructure-canvas-lms-and-vimeo-breaches-impact-millions-of-users-873c77</loc>
    <lastmod>2026-05-06T18:06:14.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cemig-allegedly-breached-exposing-a-190gb-watson-instance-dump-from-the-brazilia-59ff99</loc>
    <lastmod>2026-05-06T17:05:52.772Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vip-buenaventura-allegedly-leaked-exposing-70-000-user-records-from-the-colombia-488178</loc>
    <lastmod>2026-05-06T17:06:07.246Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-at-1c07d8</loc>
    <lastmod>2026-05-11T07:09:41.263Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/attacks-abuse-windows-phone-link-to-steal-texts-amp-bypass-2fa-d204cc</loc>
    <lastmod>2026-05-06T16:06:19.956Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/before-the-breach-there-was-a-test-environment-149dd9</loc>
    <lastmod>2026-05-06T16:06:04.054Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-warns-of-actively-exploited-pan-os-zero-day-granting-root-acc-3418ad</loc>
    <lastmod>2026-05-06T16:05:44.306Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-warns-of-actively-exploited-pan-os-zero-day-granting-root-acc-75855c</loc>
    <lastmod>2026-05-06T17:09:57.297Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/caf-caisse-d-allocations-familiales-allegedly-breached-exposing-22-million-recor-39cc66</loc>
    <lastmod>2026-05-06T16:05:26.970Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iungo-cloud-https-t-co-ntf9is6zqq-allegedly-leaked-exposing-21m-corporate-email--d12c4a</loc>
    <lastmod>2026-05-06T23:09:29.543Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/croesus-https-t-co-9asmdytkzk-allegedly-breached-exposing-19-220-canadian-user-r-79dc02</loc>
    <lastmod>2026-05-08T22:10:00.401Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kgi-https-t-co-ls4xabndqk-allegedly-breached-exposing-5m-hong-kong-stock-investo-090fad</loc>
    <lastmod>2026-05-09T13:09:56.445Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-apt-intrusion-masquerades-as-chaos-ransomware-attack-39a94d</loc>
    <lastmod>2026-05-06T15:05:18.970Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attacks-ef778c</loc>
    <lastmod>2026-05-08T07:08:37.387Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oceanlotus-suspected-of-using-pypi-to-deliver-zichatbot-malware-e65fb4</loc>
    <lastmod>2026-05-06T14:08:42.260Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-critical-infrastructure-must-master-isolation-recovery-ac8632</loc>
    <lastmod>2026-05-06T13:09:45.379Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rowhammer-attack-against-nvidia-chips-schneier-on-security-057696</loc>
    <lastmod>2026-05-09T21:09:51.281Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/my-favorite-remus-botnet-c2-domain-so-far-havelbeenpwned-net-nicenic-internation-f501ed</loc>
    <lastmod>2026-05-06T11:08:29.175Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rowhammer-attack-against-nvidia-chips-https-t-co-xyv2kenohd-9fb978</loc>
    <lastmod>2026-05-06T11:08:22.767Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sophisticated-quasar-linux-rat-targets-software-developers-1a9655</loc>
    <lastmod>2026-05-06T10:09:24.386Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/government-scientific-entities-hit-via-daemon-tools-supply-chain-attack-a5bd7c</loc>
    <lastmod>2026-05-06T10:09:36.018Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-warns-of-firewall-rce-zero-day-exploited-in-attacks-52262c</loc>
    <lastmod>2026-05-06T10:09:07.231Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-s-android-apps-get-public-verification-to-stop-supply-chain-attacks-6297cd</loc>
    <lastmod>2026-05-06T10:08:41.938Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/windows-phone-link-exploited-by-cloudz-rat-to-steal-credentials-and-otps-2f2d59</loc>
    <lastmod>2026-05-06T11:08:09.821Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/quasar-linux-qlnx-a-silent-foothold-in-the-supply-chain-inside-a-full-featured-l-6a7fa6</loc>
    <lastmod>2026-05-06T10:08:26.774Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/just-saw-this-quasar-linux-qlnx-a-silent-foothold-in-the-supply-chain-inside-a-f-0dc676</loc>
    <lastmod>2026-05-06T09:08:14.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/massive-low-and-slow-ddos-attack-hits-platform-with-2-45-billion-in-5-hours-da24cd</loc>
    <lastmod>2026-05-06T08:05:49.877Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution-2c5838</loc>
    <lastmod>2026-05-06T08:05:39.973Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firewalls-46140f</loc>
    <lastmod>2026-05-06T06:05:16.520Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weekly-update-502-5e7ed3</loc>
    <lastmod>2026-05-07T11:09:59.885Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-stealthy-quasar-linux-malware-targets-software-developers-edc299</loc>
    <lastmod>2026-05-06T01:09:39.256Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-what-you-need-to-know-about-the-most-severe-linux-threat-in-years-89c04a</loc>
    <lastmod>2026-05-06T00:09:59.523Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/blackwater-ransomware-chat-portal-http-6t5g73fbzdjuhvvovuvuhc4mdgefrwn75szssx4ft-e43812</loc>
    <lastmod>2026-05-06T00:09:42.181Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-cve-2026-31431-is-a-critical-privilege-escalation-in-the-linux-kernel--bf04f4</loc>
    <lastmod>2026-05-06T00:09:48.480Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-source-code-breach-highlights-growing-supply-chain-threats-9be942</loc>
    <lastmod>2026-05-05T22:09:30.571Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-hacker-claims-data-theft-from-8-800-schools-universities-290b29</loc>
    <lastmod>2026-05-05T22:09:15.383Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-report-amazon-ses-abused-in-phishing-to-evade-detection-3a66f8</loc>
    <lastmod>2026-05-05T22:09:23.694Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-wants-critical-infrastructure-to-operate-weeks-to-months-in-isolation-durin-bd6041</loc>
    <lastmod>2026-05-05T22:09:07.343Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-c2-infrastructure-and-lures-detected-associated-with-coruna-and-darksword-ma-fcf64a</loc>
    <lastmod>2026-05-05T22:08:59.059Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/most-of-you-have-probably-already-seen-the-reports-about-the-daemon-tools-supply-bb0779</loc>
    <lastmod>2026-05-07T05:09:46.947Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dolphin-x-a-new-all-in-one-windows-rat-advertised-with-over-600-functions-is-all-2b4035</loc>
    <lastmod>2026-05-07T02:10:02.389Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-b-r-automation-studio-71bd29</loc>
    <lastmod>2026-05-06T02:09:57.860Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-b-r-automation-runtime-549754</loc>
    <lastmod>2026-05-06T03:09:56.002Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hitachi-energy-pcm600-7058bf</loc>
    <lastmod>2026-05-06T04:09:43.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/johnson-controls-cem-ac2000-ec2397</loc>
    <lastmod>2026-05-06T04:09:51.981Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-b-r-pvi-e6f942</loc>
    <lastmod>2026-05-06T04:10:00.126Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daemon-tools-trojanized-in-supply-chain-attack-to-deploy-backdoor-d9aeea</loc>
    <lastmod>2026-05-05T23:10:00.149Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-miss-e2113c</loc>
    <lastmod>2026-05-06T01:09:58.834Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-targeting-list-pairing-cryptocurrency-wallet-addresses-with-twitter-x-username-2c383b</loc>
    <lastmod>2026-05-05T21:10:00.147Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-offering-for-sale-an-unpatched-boolean-based-blind-sql-injecti-a2af6b</loc>
    <lastmod>2026-05-05T20:09:42.908Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daemon-tools-supply-chain-attack-compromises-official-installers-with-malware-951945</loc>
    <lastmod>2026-05-05T20:09:26.562Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-potential-rce-b1549c</loc>
    <lastmod>2026-05-05T19:09:57.010Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/student-hacked-taiwan-high-speed-rail-to-trigger-emergency-brakes-221197</loc>
    <lastmod>2026-05-05T19:09:48.721Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/latvian-national-sentenced-for-ransomware-attacks-run-by-former-conti-leaders-11ab38</loc>
    <lastmod>2026-05-06T23:09:13.701Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-released-the-list-of-the-9-000-schools-affected-by-the-instructure--2c4781</loc>
    <lastmod>2026-05-05T19:09:31.412Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-rce-flaw-actively-exploited-via-exposed-debug-api-f6b372</loc>
    <lastmod>2026-05-05T19:09:04.383Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-rce-flaw-actively-exploited-via-exposed-debug-api-https-t-co-toy-46ffdb</loc>
    <lastmod>2026-05-05T18:09:48.656Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/imss-banco-de-sangre-the-blood-bank-of-mexico-s-instituto-mexicano-del-seguro-so-ebef77</loc>
    <lastmod>2026-05-05T18:10:00.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-edge-stores-passwords-in-process-memory-posing-enterprise-risk-027e3d</loc>
    <lastmod>2026-05-05T18:09:33.023Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ftc-to-ban-data-broker-kochava-from-selling-americans-location-data-a02c9d</loc>
    <lastmod>2026-05-05T16:10:02.252Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-don-t-check-f3a792</loc>
    <lastmod>2026-05-05T17:09:04.985Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-warns-of-sophisticated-phishing-campaign-targeting-us-organizations-40c953</loc>
    <lastmod>2026-05-05T17:09:24.846Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bvwg-w298-2323263-1-11e-396aa1</loc>
    <lastmod>2026-05-05T17:09:57.956Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-0073-zero-click-rce-flaw-in-android-x27-s-wireless-adb-bypasses-authent-149895</loc>
    <lastmod>2026-05-05T17:09:14.232Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-pw0avxeu0k-a-french-language-assessment-platform-has-allegedly-been-b-c37960</loc>
    <lastmod>2026-05-05T16:09:25.740Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-0073-zero-click-rce-flaw-in-android-s-wireless-adb-bypasses-authenticat-c3ef3a</loc>
    <lastmod>2026-05-05T16:09:44.350Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/phishlab-v1-a-new-phishing-as-a-service-panel-is-allegedly-being-sold-on-a-hacki-951b93</loc>
    <lastmod>2026-05-05T16:09:18.319Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-blacknet-00-a-new-ransomware-builder-platform-is-allegedly-being-sold-on-a-h-679cfd</loc>
    <lastmod>2026-05-05T16:09:34.923Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/finger-protocol-lolbin-clickfix-campaign-that-uses-fake-ai-tools-background-remo-8333f0</loc>
    <lastmod>2026-05-05T16:09:54.847Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-digercic-direccion-general-de-registro-civil-identificacion-y-cedulacion-the-b81fdc</loc>
    <lastmod>2026-05-05T15:08:56.664Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vimeo-data-breach-exposes-personal-information-of-119-000-people-69c1a2</loc>
    <lastmod>2026-05-09T17:10:01.495Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-bug-could-expose-300-000-ollama-deployments-to-information-theft-c3fd45</loc>
    <lastmod>2026-05-05T15:08:09.521Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ci-fortify-cisa-5a388f</loc>
    <lastmod>2026-05-05T14:08:09.418Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anti-ice-site-gtfo-ice-accused-of-exposing-data-of-17-000-activists-e79407</loc>
    <lastmod>2026-05-05T14:08:49.510Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anti-tampering-kernel-driver-deep-dive-we-have-found-an-interesting-whql-signed--7e6e65</loc>
    <lastmod>2026-05-05T14:08:24.194Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-back-door-attackers-know-about-and-most-security-teams-still-haven-t-closed-e8d6c3</loc>
    <lastmod>2026-05-05T14:06:18.565Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/metinfo-cms-cve-2026-29014-exploited-for-remote-code-execution-attacks-a87226</loc>
    <lastmod>2026-05-05T14:08:00.586Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/proton-mail-rolls-out-post-quantum-encryption-for-all-users-as-industry-braces-f-010230</loc>
    <lastmod>2026-05-09T15:10:00.272Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-now-offers-up-to-1-5-million-for-some-android-exploits-31b2bc</loc>
    <lastmod>2026-05-09T07:09:56.612Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/karakurt-extortion-gang-cold-case-negotiator-gets-8-5-years-in-prison-a39b85</loc>
    <lastmod>2026-05-09T09:10:01.282Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cloudz-malware-abuses-microsoft-phone-link-to-steal-sms-and-otps-2ca225</loc>
    <lastmod>2026-05-09T11:09:53.631Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-remote-code-execution-vulnerability-patched-in-android-9501fe</loc>
    <lastmod>2026-05-09T00:09:50.663Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/karakurt-ransomware-negotiator-sentenced-to-prison-d92cc7</loc>
    <lastmod>2026-05-09T04:09:57.200Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/femitbot-network-abuses-telegram-mini-apps-for-crypto-scams-and-android-malware-756a13</loc>
    <lastmod>2026-05-08T20:09:51.304Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/and-smica83-uploaded-some-related-samples-to-bazaar-https-t-co-wqojm1hv75-and-as-477c7d</loc>
    <lastmod>2026-05-08T20:10:01.964Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-scanned-1-million-exposed-ai-services-here-s-how-bad-the-security-actually-is-b41605</loc>
    <lastmod>2026-05-08T05:10:05.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/darksword-malware-schneier-on-security-cdc190</loc>
    <lastmod>2026-05-07T06:09:57.835Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-on-android-and-window-106d58</loc>
    <lastmod>2026-05-06T02:09:49.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/scarcruft-hackers-push-birdcall-android-malware-via-game-platform-ca1775</loc>
    <lastmod>2026-05-06T03:09:47.431Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/metinfo-weaver-e-cology-vulnerabilities-in-attackers-crosshairs-bbe967</loc>
    <lastmod>2026-05-06T05:09:58.369Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/whatsapp-discloses-file-spoofing-arbitrary-url-scheme-vulnerabilities-21e426</loc>
    <lastmod>2026-05-06T06:10:03.715Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ts-1590-2026-fe9b6a</loc>
    <lastmod>2026-05-05T11:09:48.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/popular-daemon-tools-software-compromised-1e4528</loc>
    <lastmod>2026-05-05T23:09:50.674Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kaspersky-just-published-an-article-titled-daemon-tools-software-infected-supply-6ceebf</loc>
    <lastmod>2026-05-05T10:09:48.827Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-rce-flaw-cve-2026-22679-actively-exploited-via-debug-api-61b0c3</loc>
    <lastmod>2026-05-05T08:09:34.973Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-details-phishing-campaign-targeting-35-000-users-across-26-countries-edbc17</loc>
    <lastmod>2026-05-05T10:09:25.808Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/linkedin-locks-your-gdpr-rights-behind-a-paywall-7fa734</loc>
    <lastmod>2026-05-05T06:09:31.722Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weaver-e-cology-critical-bug-exploited-in-attacks-since-march-0a1b8c</loc>
    <lastmod>2026-05-05T00:09:24.631Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iungo-cloud-https-t-co-ntf9is6zqq-a-brazilian-cloud-telephony-operator-has-alleg-010b01</loc>
    <lastmod>2026-05-04T23:09:29.209Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/rmm-tools-fuel-stealthy-phishing-campaign-398088</loc>
    <lastmod>2026-05-04T22:09:57.925Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploit-cyber-frenzy-threatens-millions-via-critical-cpanel-vulnerability-dcb5d5</loc>
    <lastmod>2026-05-04T22:10:04.589Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/amazon-ses-increasingly-abused-in-phishing-to-evade-detection-94b68f</loc>
    <lastmod>2026-05-04T22:09:52.078Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-is-a-real-linux-security-crisis-wrapped-in-ai-slop-f0ff62</loc>
    <lastmod>2026-05-04T22:09:39.997Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/latvian-national-deniss-zolotarjovs-sentenced-to-102-months-8-5-yrs-for-his-role-ef8ad8</loc>
    <lastmod>2026-05-04T21:09:28.373Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/johnson-amp-johnson-innovative-medicine-has-been-claimed-a-victim-to-spacebears--f08f8c</loc>
    <lastmod>2026-05-04T21:09:41.247Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenconnect-rmm-tools-c26330</loc>
    <lastmod>2026-05-05T08:09:08.553Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/la-redoute-a-major-french-e-commerce-and-home-goods-retailer-has-allegedly-been--abce8a</loc>
    <lastmod>2026-05-04T20:09:26.883Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-a-screensaver-cracked-the-internet-x27-s-trust-layer-inside-the-digicert-ha-8e4754</loc>
    <lastmod>2026-05-09T07:09:10.335Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bouygues-telecom-one-of-france-s-largest-telecommunications-providers-has-allege-42b2ef</loc>
    <lastmod>2026-05-04T19:09:41.158Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-a-screensaver-cracked-the-internet-s-trust-layer-inside-the-digicert-hack-h-e46076</loc>
    <lastmod>2026-05-04T19:10:00.864Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zurich-insurance-has-allegedly-been-breached-with-a-massive-leak-containing-over-29c17c</loc>
    <lastmod>2026-05-04T20:09:12.938Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/progress-patches-critical-moveit-automation-bug-enabling-authentication-bypass-b746b9</loc>
    <lastmod>2026-05-04T19:09:33.581Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-source-code-repository-breached-318560</loc>
    <lastmod>2026-05-04T19:09:07.266Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-to-6aa915</loc>
    <lastmod>2026-05-04T18:09:47.151Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/backdoored-pytorch-lightning-package-drops-credential-stealer-09d8ee</loc>
    <lastmod>2026-05-04T19:09:16.556Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trellix-discloses-data-breach-after-source-code-repository-hack-b90760</loc>
    <lastmod>2026-05-04T19:09:25.814Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-lands-on-cisa-x27-s-kev-a-nine-year-old-linux-bug-becomes-a-patch-dead-77bdca</loc>
    <lastmod>2026-05-04T18:09:20.015Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-lands-on-cisa-s-kev-a-nine-year-old-linux-bug-becomes-a-patch-deadline-24648b</loc>
    <lastmod>2026-05-04T18:09:10.927Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-watchman-gets-watched-trellix-discloses-source-code-breach-780291</loc>
    <lastmod>2026-05-04T17:09:56.630Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-watchman-gets-watched-trellix-discloses-source-code-breach-https-t-co-d-953ac4</loc>
    <lastmod>2026-05-04T17:09:42.847Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/groupe-cga-a-french-automotive-dealership-group-has-allegedly-been-breached-with-c7df3b</loc>
    <lastmod>2026-05-04T17:09:49.207Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/weekly-recap-ai-powered-phishing-android-spying-tool-linux-exploit-github-rce-mo-4916cb</loc>
    <lastmod>2026-05-12T02:08:47.247Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silver-fox-springs-tax-themed-attacks-on-orgs-in-india-russia-2438a4</loc>
    <lastmod>2026-05-04T17:09:19.061Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dhs-demanded-google-surrender-data-on-canadian-s-activity-location-over-anti-ice-e55d56</loc>
    <lastmod>2026-05-04T17:09:27.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fund-for-teachers-https-t-co-hllp6fkjdx-a-u-s-nonprofit-that-provides-grants-to--2cfab5</loc>
    <lastmod>2026-05-04T16:09:22.688Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-new-ivr-interactive-voice-response-0day-automation-tool-is-allegedly-being-sol-e74480</loc>
    <lastmod>2026-05-04T16:09:45.744Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/an-egyptian-database-containing-1-5-million-student-records-and-a-60-million-rec-f63017</loc>
    <lastmod>2026-05-04T16:10:00.204Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/wiz-zeroday-cloud-event-reveals-20-year-old-postgresql-vulnerabilities-9f850b</loc>
    <lastmod>2026-05-04T16:09:14.221Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-in-india-and-russia-21b52b</loc>
    <lastmod>2026-05-04T14:09:47.930Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/2026-the-year-of-ai-assisted-attacks-662779</loc>
    <lastmod>2026-05-04T15:09:03.074Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/digicert-revokes-certificates-after-support-portal-hack-65987f</loc>
    <lastmod>2026-05-04T14:09:29.122Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/progress-warns-of-critical-moveit-automation-auth-bypass-flaw-c40693</loc>
    <lastmod>2026-05-04T14:09:07.598Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security-f44ef3</loc>
    <lastmod>2026-05-04T12:09:45.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-vulnerability-weaponized-to-target-government-and-msp-networks-cf23c5</loc>
    <lastmod>2026-05-05T01:09:58.400Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exploitation-of-copy-fail-linux-vulnerability-begins-896440</loc>
    <lastmod>2026-05-05T01:09:58.213Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-says-copy-fail-flaw-now-exploited-to-root-linux-systems-6c99d8</loc>
    <lastmod>2026-05-05T01:09:58.007Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-confirms-april-windows-updates-cause-backup-failures-7032f6</loc>
    <lastmod>2026-05-04T12:09:08.471Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-data-centers-now-belong-on-the-critical-infrastructure-list-f9074e</loc>
    <lastmod>2026-05-04T12:08:44.045Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-40-000-servers-compromised-in-ongoing-cpanel-exploitation-7d4f23</loc>
    <lastmod>2026-05-05T01:09:57.802Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/global-crackdown-arrests-276-shuts-9-crypto-scam-centers-seizes-701m-07e616</loc>
    <lastmod>2026-05-04T08:08:03.717Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/edtech-firm-instructure-discloses-data-breach-amid-hacker-leak-threats-986cf7</loc>
    <lastmod>2026-05-04T08:07:46.547Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fixes-available-for-cve-2026-31431-copy-fail-linux-kernel-local-privilege-escala-7c8cda</loc>
    <lastmod>2026-05-05T01:09:57.364Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/instructure-confirms-data-breach-shinyhunters-claims-attack-e98fb1</loc>
    <lastmod>2026-05-04T00:06:25.535Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-egyptian-ministry-of-manpower-ministry-of-labour-has-allegedly-been-breached-afb6d9</loc>
    <lastmod>2026-05-04T07:09:39.552Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/psycho-prat-ecole-de-psychologues-praticiens-a-french-psychology-school-has-alle-68b602</loc>
    <lastmod>2026-05-03T23:09:43.113Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-41940-a-high-performance-multi-threaded-security-auditing-tool-designed-098ab2</loc>
    <lastmod>2026-05-04T06:10:01.213Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/i-have-posted-several-of-these-here-is-another-cpanel-whm-poc-cve-2026-41940-cpa-7aa981</loc>
    <lastmod>2026-05-04T06:10:01.094Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zenmobile-https-t-co-hrg8xe7vu2-a-french-mobile-virtual-network-operator-mvno-ha-827747</loc>
    <lastmod>2026-05-04T05:09:59.900Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-defender-wrongly-flags-digicert-certs-as-trojan-win32-cerdigent-a-dha-4de013</loc>
    <lastmod>2026-05-03T21:09:59.751Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/crocs-israel-https-t-co-kyvbxkw7ag-the-israeli-branch-of-the-global-footwear-bra-25877a</loc>
    <lastmod>2026-05-04T05:09:49.272Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/senzing-https-t-co-ye06b8skxk-a-u-s-based-ai-software-company-specializing-in-ha-add924</loc>
    <lastmod>2026-05-04T05:09:38.666Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/actradis-https-t-co-akxt4thf3g-a-french-b2b-compliance-and-administrative-docume-18889c</loc>
    <lastmod>2026-05-04T04:09:43.118Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/paying-ransom-won-t-help-as-vect-2-0-ransomware-destroys-data-irreversibly-ea4cb6</loc>
    <lastmod>2026-05-03T18:06:36.217Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/profil-search-a-french-recruitment-platform-cdd-cdi-solutions-has-allegedly-been-d3b7f5</loc>
    <lastmod>2026-05-04T02:09:56.431Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ontario-college-of-health-amp-technology-has-allegedly-been-breached-with-studen-566e55</loc>
    <lastmod>2026-05-04T01:10:01.719Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/telegram-mini-apps-abused-for-crypto-scams-android-malware-delivery-78a60b</loc>
    <lastmod>2026-05-03T22:09:58.461Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-egyptian-ministry-of-manpower-ministry-of-labour-has-allegedly-been-breached-496784</loc>
    <lastmod>2026-05-03T22:09:48.890Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/minimed-panama-the-largest-private-primary-healthcare-network-in-panama-has-alle-7aab88</loc>
    <lastmod>2026-05-03T20:09:58.116Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev-e673c1</loc>
    <lastmod>2026-05-04T06:10:00.958Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-czppxo8djq-a-french-government-health-related-platform-has-allegedly--4fccf7</loc>
    <lastmod>2026-05-03T17:09:45.082Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-41940-webpros-cpanel-and-whm-authentication-bypass-via-login-flow-poc-h-1c5afa</loc>
    <lastmod>2026-05-02T23:06:05.100Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-cpanel-situation-is-spiraling-fast-on-april-29-cve-2026-41940-was-disclosed--d6b951</loc>
    <lastmod>2026-05-03T15:10:00.567Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanelsniper-cve-2026-41940-cpanel-amp-whm-authentication-bypass-via-session-fil-8423e4</loc>
    <lastmod>2026-05-03T15:09:53.467Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critrical-cpanel-flaw-mass-exploited-in-sorry-ransomware-attacks-01b497</loc>
    <lastmod>2026-05-02T22:06:04.203Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-appsheet-exploited-in-30-000-user-facebook-phishing-operation-e9ab45</loc>
    <lastmod>2026-05-02T20:05:52.621Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-known-as-nearlevrai-pwndlevrai-claims-to-have-exploited-a-sql-vul-68dc86</loc>
    <lastmod>2026-05-03T15:09:45.946Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/universidad-da-vinci-de-guatemala-has-allegedly-been-breached-with-a-massive-stu-9fb153</loc>
    <lastmod>2026-05-03T14:09:54.821Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/4vps-su-a-russian-service-provider-since-2017-used-by-forums-the-com-ransomware--047690</loc>
    <lastmod>2026-05-03T13:09:55.641Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fredrikstad-municipality-of-norway-https-t-co-zeurlp9mwa-has-allegedly-been-brea-63e669</loc>
    <lastmod>2026-05-03T12:09:52.169Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hospital-universitario-nacional-de-colombia-https-t-co-eca2wwrcsq-a-major-colomb-9e5cd6</loc>
    <lastmod>2026-05-03T12:09:59.141Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-quimarat-v2-0-0-a-new-cross-platform-java-based-rat-is-allegedly-being-sold--ec2d95</loc>
    <lastmod>2026-05-03T10:09:53.756Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/banco-de-machala-an-ecuadorian-bank-has-allegedly-been-breached-with-over-100-00-f09b36</loc>
    <lastmod>2026-05-03T12:09:45.728Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse-65bac2</loc>
    <lastmod>2026-05-02T16:07:26.708Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ransomware-group-and-ip-leak-cmd-organization-clearnet-cmdofficial-com-ip-20-864702</loc>
    <lastmod>2026-05-03T09:09:59.260Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/radimagen-panama-a-panamanian-medical-imaging-provider-has-allegedly-been-breach-107df9</loc>
    <lastmod>2026-05-02T18:09:43.807Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/clinica-hospital-panamericano-https-t-co-4a528yvilk-a-panamanian-hospital-has-al-bcd478</loc>
    <lastmod>2026-05-03T09:09:53.452Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/2-us-cybersecurity-experts-jailed-for-aiding-alphv-blackcat-ransomware-3920ab</loc>
    <lastmod>2026-05-02T14:05:58.280Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-bluekit-phishing-kit-features-ai-assistant-bd94af</loc>
    <lastmod>2026-05-03T07:09:57.527Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/disneyland-now-uses-face-recognition-on-visitors-fb6441</loc>
    <lastmod>2026-05-03T05:09:56.826Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation-a-ac3884</loc>
    <lastmod>2026-05-03T05:09:47.912Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kodex-law-enforcement-panel-accounts-are-allegedly-being-sold-providing-access-t-d41ec4</loc>
    <lastmod>2026-05-03T03:09:57.569Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/obfuscated-websocket-backdoors-are-injecting-credit-card-skimmers-into-hundreds--8adbbd</loc>
    <lastmod>2026-05-03T03:10:04.920Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/edu-tech-firm-instructure-discloses-cyber-incident-probes-impact-9cecf1</loc>
    <lastmod>2026-05-02T21:09:51.350Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dangerous-new-linux-exploit-gives-attackers-root-access-to-countless-computers-738696</loc>
    <lastmod>2026-05-03T01:09:47.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-airsnitch-attack-techniques-target-the-wi-fi-infrastructure-itself-we-show-h-219b1d</loc>
    <lastmod>2026-05-02T21:10:05.568Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/30-000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign-c476d0</loc>
    <lastmod>2026-05-02T20:10:01.761Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-good-the-bad-and-the-ugly-in-cybersecurity-week-18-ee5b96</loc>
    <lastmod>2026-05-02T17:10:04.880Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ugly-official-sap-npm-packages-compromised-in-supply-chain-attack-attackers-targ-3adcb0</loc>
    <lastmod>2026-05-02T18:09:51.513Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/authorities-extradited-a-silk-typhoon-linked-hacker-dismantled-a-50m-crypto-frau-f2c781</loc>
    <lastmod>2026-05-02T19:09:51.221Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/facoparis-a-french-educational-institution-has-allegedly-been-breached-with-a-12-6fcef7</loc>
    <lastmod>2026-05-02T13:10:05.777Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/good-alleged-silk-typhoon-hacker-extradited-to-the-u-s-for-cyberespionage-europe-a0b9be</loc>
    <lastmod>2026-05-02T18:10:05.571Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/45-000-attacks-5-300-backdoors-tied-to-china-linked-cybercrime-operation-ff7570</loc>
    <lastmod>2026-05-12T19:09:58.078Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-425b80</loc>
    <lastmod>2026-05-02T13:09:58.682Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/your-ai-agent-reads-a-resume-hidden-inside-a-command-to-steal-data-no-malware-ju-b63b13</loc>
    <lastmod>2026-05-02T12:09:50.883Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/15-year-old-detained-over-french-govt-agency-data-breach-f3a097</loc>
    <lastmod>2026-05-01T18:07:55.765Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-jenkins-access-to-deploy-ddos-botnet-against-gaming-servers-02b5da</loc>
    <lastmod>2026-05-02T09:09:51.372Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-what-is-advertised-as-the-full-internal-personnel-data-b2345c</loc>
    <lastmod>2026-05-02T10:09:43.188Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/jeddah-transport-company-https-t-co-ui3ikjyojf-a-saudi-arabian-transportation-co-d6af49</loc>
    <lastmod>2026-05-02T09:10:01.347Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-defense-evasion-tool-called-exengine-is-being-sold-as-a-service-marketed-as-an-493862</loc>
    <lastmod>2026-05-02T10:09:53.662Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/questrade-a-canadian-financial-services-company-offering-online-investing-and-tr-8c1b3f</loc>
    <lastmod>2026-05-02T06:09:56.429Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canonical-has-confirmed-they-and-ubuntu-are-under-a-ddos-attack-313-team-has-tak-1d26e0</loc>
    <lastmod>2026-05-01T17:08:46.823Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/madeindesign-https-t-co-72brs6en33-a-french-online-retailer-specializing-in-desi-3e0b8f</loc>
    <lastmod>2026-05-02T08:09:51.708Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/guia-de-moteis-https-t-co-yivt5szova-a-brazilian-online-motel-guide-and-reservat-272ece</loc>
    <lastmod>2026-05-02T06:10:03.102Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-scattered-spider-hacker-arrested-soc-effectiveness-metrics-nsa-too-537e5a</loc>
    <lastmod>2026-05-10T13:09:20.039Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks-783b2a</loc>
    <lastmod>2026-05-02T06:09:32.372Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kenlo-imob-formerly-ingaia-imob-a-leading-brazilian-real-estate-crm-used-by-brok-ad2aa9</loc>
    <lastmod>2026-05-02T00:09:53.913Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-tribunal-supremo-electoral-tse-guatemala-s-supreme-electoral-tribunal-has-al-7fcc85</loc>
    <lastmod>2026-05-02T00:09:42.333Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-cybersecurity-professionals-get-4-year-sentences-in-blackcat-ransomware-atta-5f9941</loc>
    <lastmod>2026-05-01T23:09:35.119Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-vulnerability-lets-attackers-bypass-login-gain-root-access-257b2c</loc>
    <lastmod>2026-05-01T12:07:58.373Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lessons-from-the-pocketos-incident-when-ai-agents-go-beyond-their-limits-a6c569</loc>
    <lastmod>2026-05-01T22:09:46.903Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-ransomware-negotiator-was-working-for-a-ransomware-gang-schneier-on-security-fd21bd</loc>
    <lastmod>2026-05-01T12:07:50.868Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-ransomware-negotiator-was-working-for-a-ransomware-gang-https-t-co-umwgtdb6di-566a34</loc>
    <lastmod>2026-05-01T20:10:01.081Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-us-security-experts-sentenced-to-prison-for-helping-ransomware-gang-a4584b</loc>
    <lastmod>2026-05-01T12:09:41.406Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sophisticated-deep-door-backdoor-enables-espionage-disruption-e58b99</loc>
    <lastmod>2026-05-01T20:09:31.694Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisco-releases-open-source-tool-for-ai-model-provenance-289f98</loc>
    <lastmod>2026-05-01T20:09:40.356Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/poisoned-ruby-gems-and-go-modules-exploit-ci-pipelines-for-credential-theft-25d2b3</loc>
    <lastmod>2026-05-04T01:09:29.815Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/preparing-for-a-vulnerability-patch-wave-f7729e</loc>
    <lastmod>2026-05-01T10:09:41.642Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hugging-face-clawhub-abused-for-malware-distribution-fabe26</loc>
    <lastmod>2026-05-01T10:08:56.908Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-warns-of-surge-in-hacker-enabled-cargo-theft-7b0940</loc>
    <lastmod>2026-05-01T10:09:33.568Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerability-patch-roundup-april-2026-7658e5</loc>
    <lastmod>2026-05-20T09:08:46.755Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-ransomware-negotiators-get-4-years-in-prison-over-blackcat-attacks-e5bbbf</loc>
    <lastmod>2026-05-01T08:09:02.051Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-800-hit-in-mini-shai-hulud-attack-on-sap-lightning-intercom-f5f79a</loc>
    <lastmod>2026-05-01T08:08:07.885Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/clickfix-style-campaign-operated-eight-bulk-registered-588gj-shop-lure-domains-i-bc4a97</loc>
    <lastmod>2026-05-01T19:09:59.176Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/former-incident-responders-sentenced-to-4-years-in-prison-for-committing-ransomw-1373b0</loc>
    <lastmod>2026-05-01T19:09:50.263Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mini-shai-hulud-malware-reaches-packagist-through-compromised-intercom-php-packa-c4e875</loc>
    <lastmod>2026-05-01T19:09:39.999Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/interesting-claim-a-threat-actor-operating-under-the-alias-paws-is-selling-root--81620a</loc>
    <lastmod>2026-05-01T18:09:58.935Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/private-chats-photos-of-celebs-exposed-in-suspected-stalkerware-leak-13bbb3</loc>
    <lastmod>2026-04-30T22:08:23.705Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-hits-sap-packages-with-mini-shai-hulud-attack-58cc35</loc>
    <lastmod>2026-04-30T22:08:15.096Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-defenders-become-the-attackers-two-u-s-cybersecurity-pros-sentenced-in--299ab5</loc>
    <lastmod>2026-04-30T22:07:59.015Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/when-the-defenders-become-the-attackers-two-u-s-cybersecurity-pros-sentenced-in--a4b2e6</loc>
    <lastmod>2026-04-30T22:07:49.091Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-s-authentication-bypass-bug-is-being-exploited-in-the-wild-cisa-warns-d25fe3</loc>
    <lastmod>2026-04-30T22:07:42.273Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-bluekit-phishing-service-includes-an-ai-assistant-40-templates-5ff4d7</loc>
    <lastmod>2026-04-30T20:10:05.216Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/misconfigured-server-run-by-hackers-leaks-345-000-stolen-credit-cards-5ce3b2</loc>
    <lastmod>2026-04-30T20:09:55.576Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anthropic-unveils-claude-security-to-counter-ai-powered-exploit-surge-e7b577</loc>
    <lastmod>2026-05-01T15:10:01.743Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-fuels-industrial-cybercrime-as-time-to-exploit-shrinks-to-hours-4be165</loc>
    <lastmod>2026-05-07T22:09:57.746Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-cd3cbd</loc>
    <lastmod>2026-05-01T15:09:52.318Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/liberty-mutual-insurance-has-been-claimed-a-victim-to-everest-ransomware-estimat-7cbf71</loc>
    <lastmod>2026-04-30T20:09:02.852Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/watchtowr-labs-released-a-write-up-and-detection-script-on-the-cpanel-whm-vulner-be0d4a</loc>
    <lastmod>2026-04-30T20:09:43.921Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks-f5ecda</loc>
    <lastmod>2026-05-01T15:09:13.144Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pytorch-lightning-compromised-in-pypi-supply-chain-attack-to-steal-credentials-31bd68</loc>
    <lastmod>2026-05-01T14:09:54.678Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-web-based-telegram-account-management-and-automation-panel-called-hub-is-b-9b93fe</loc>
    <lastmod>2026-05-01T14:09:39.305Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-initial-access-to-an-unnamed-united-states-based-telec-633f90</loc>
    <lastmod>2026-05-01T14:09:45.828Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-unified-malware-builder-platform-called-quimacore-v2-0-is-being-sold-as-a--2630d8</loc>
    <lastmod>2026-05-01T13:09:56.255Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zencer-a-spanish-energy-sector-company-that-helps-businesses-and-individuals-opt-da988d</loc>
    <lastmod>2026-05-01T14:09:24.849Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-8e2940</loc>
    <lastmod>2026-05-01T13:09:49.443Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-prosecutors-link-15-year-old-to-gov-mega-breach-c3e981</loc>
    <lastmod>2026-04-30T17:06:15.093Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-prosecutors-link-15-year-old-to-mega-breach-at-state-s-secure-document-ag-60a45d</loc>
    <lastmod>2026-04-30T17:06:05.839Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-full-backup-of-breachforums-hn-the-cybercrime-forum--e174cc</loc>
    <lastmod>2026-05-01T13:09:26.404Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-the-ministerio-de-educacion-ministry-of-education-of-guatemala-has-allegedly-d61ac3</loc>
    <lastmod>2026-05-01T12:09:48.657Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-commodity-remote-access-trojan-called-scorpio-hvnc-is-being-sold-as-a-subs-f76671</loc>
    <lastmod>2026-05-01T12:09:55.324Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sonicwall-urges-immediate-patching-of-firewall-vulnerabilities-6471fc</loc>
    <lastmod>2026-05-01T07:10:01.380Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-npm-packages-targeted-in-supply-chain-attack-895a14</loc>
    <lastmod>2026-05-01T11:09:27.235Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-ability-symphony-plus-engineering-fee860</loc>
    <lastmod>2026-05-01T02:10:04.798Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-system-800xa-symphony-plus-iec-61850-276da0</loc>
    <lastmod>2026-04-30T16:05:19.530Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-ability-optimax-eab714</loc>
    <lastmod>2026-04-30T16:05:28.438Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-pcm600-321117</loc>
    <lastmod>2026-04-30T16:05:38.340Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-awin-gateways-acbe0e</loc>
    <lastmod>2026-05-01T06:09:34.521Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/abb-edgenius-management-portal-0bc023</loc>
    <lastmod>2026-05-01T06:09:43.086Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/email-threat-landscape-q1-2026-trends-and-insights-9a103c</loc>
    <lastmod>2026-05-01T07:09:52.264Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/imco-group-an-israeli-electromechanical-defense-manufacturer-that-produces-compo-8470da</loc>
    <lastmod>2026-05-01T09:09:55.719Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/two-new-extortion-crews-are-speedrunning-the-scattered-spider-playbook-9add0b</loc>
    <lastmod>2026-05-01T11:09:36.065Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/april-kb5083769-windows-11-update-causes-backup-software-failures-7f92c5</loc>
    <lastmod>2026-05-01T05:09:54.543Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-mor-f84acb</loc>
    <lastmod>2026-05-01T07:09:44.479Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/anti-ddos-firm-heaped-attacks-on-brazilian-isps-c521ba</loc>
    <lastmod>2026-05-01T06:09:52.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-copy-fail-flaw-gives-hackers-root-on-major-distros-f30ad6</loc>
    <lastmod>2026-04-30T14:07:53.028Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credential-92e8dd</loc>
    <lastmod>2026-05-01T05:09:35.426Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/etherrat-distribution-spoofing-administrative-tools-via-github-facades-a1de0b</loc>
    <lastmod>2026-05-01T05:09:46.623Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-gemini-cli-flaw-enabled-host-code-execution-supply-chain-attacks-0d9176</loc>
    <lastmod>2026-04-30T14:07:43.911Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/everyone-s-building-ai-agents-almost-nobody-s-ready-for-what-they-do-to-identity-21d36e</loc>
    <lastmod>2026-05-01T04:10:02.202Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-and-whm-bug-exploited-as-a-zero-day-poc-now-available-8a65c6</loc>
    <lastmod>2026-04-30T12:10:04.648Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/exposed-data-illustrates-the-nightmare-scenario-for-a-stalkerware-victim-41c68c</loc>
    <lastmod>2026-04-30T12:09:56.611Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-logic-flaw-in-linux-kernel-enables-system-takeover-87e300</loc>
    <lastmod>2026-04-30T12:09:21.047Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/enocean-smartserver-flaws-expose-buildings-to-remote-hacking-f9a2bb</loc>
    <lastmod>2026-04-30T12:09:01.928Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-whm-vulnerability-exploited-as-zero-day-for-months-454c55</loc>
    <lastmod>2026-04-30T12:09:12.002Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tietosuojavaltuutetun-toimisto-finland-tsv-5875-2024-2bf867</loc>
    <lastmod>2026-05-01T04:09:42.933Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fast16-malware-schneier-on-security-99fec9</loc>
    <lastmod>2026-05-01T02:09:55.874Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions-ea092c</loc>
    <lastmod>2026-05-01T02:09:40.594Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sandhills-medical-says-ransomware-breach-affects-170-000-10d636</loc>
    <lastmod>2026-04-30T10:08:17.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/opendir-http-kunden-accounts-dkb-ddns-info-https-t-co-diinzyz3pa-976eb7</loc>
    <lastmod>2026-04-30T10:08:00.900Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/low-detection-macos-malware-used-in-job-interview-themed-phishing-we-recently-ob-240487</loc>
    <lastmod>2026-05-01T01:09:54.789Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/undocumented-driver-based-browser-hijacker-reddriver-targets-chinese-speakers-an-4bf2cc</loc>
    <lastmod>2026-05-01T11:09:17.683Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-have-found-new-reddriver-similar-to-the-ones-found-by-talos-https-t-co-uazywm-088116</loc>
    <lastmod>2026-05-01T01:09:37.613Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution-189a84</loc>
    <lastmod>2026-05-01T01:09:28.750Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/9-year-old-linux-kernel-vulnerability-copy-fail-enables-full-root-access-4633f2</loc>
    <lastmod>2026-04-30T08:05:41.995Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/silver-fox-uses-the-new-abcdoor-backdoor-to-target-organizations-in-russia-and-i-c9f03b</loc>
    <lastmod>2026-05-01T09:09:23.940Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/no-action-taken-against-pimeyes-noyb-lawsuit-against-hamburg-dpa-7b8c34</loc>
    <lastmod>2026-04-30T08:08:31.041Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/can-ai-attack-the-cloud-lessons-from-building-an-autonomous-cloud-offensive-mult-07fd8d</loc>
    <lastmod>2026-04-30T02:07:21.036Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/autonomous-ai-is-a-force-multiplier-for-cloud-misconfiguration-exploitation-our--2fa4ab</loc>
    <lastmod>2026-05-01T00:10:01.627Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aur0ra-ransomware-names-its-first-seven-victims-http-u6lieui2dakbctcjea2bz4r4q32-383377</loc>
    <lastmod>2026-05-01T00:09:54.638Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-tested-palo-alto-globalprotect-vpn-credentials-for-5-c-156089</loc>
    <lastmod>2026-05-01T00:09:38.207Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hostoo-brazil-a-brazilian-shared-hosting-and-cpanel-whm-provider-has-allegedly-b-97192b</loc>
    <lastmod>2026-05-01T00:09:46.773Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/popular-wordpress-redirect-plugin-hid-dormant-backdoor-for-years-a40290</loc>
    <lastmod>2026-04-30T00:06:22.886Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/official-sap-npm-packages-compromised-to-steal-credentials-f2d751</loc>
    <lastmod>2026-04-30T01:06:12.747Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-april-30th-2026-f5f1d6</loc>
    <lastmod>2026-04-30T01:05:41.308Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/reverse-engineering-with-ai-unearths-high-severity-github-bug-bb518f</loc>
    <lastmod>2026-04-29T22:08:03.894Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-rce-flaws-in-qinglong-task-scheduler-for-cryptomining-1e6dc6</loc>
    <lastmod>2026-04-30T23:09:59.662Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/smsa-express-a-saudi-arabian-logistics-and-shipping-company-providing-domestic-a-b566a3</loc>
    <lastmod>2026-04-30T23:09:49.875Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cursor-ai-agent-wipes-pocketos-database-and-backups-in-9-seconds-69226f</loc>
    <lastmod>2026-04-29T22:08:13.640Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-money-mule-solution-what-every-scam-has-in-common-404cd2</loc>
    <lastmod>2026-04-29T21:08:05.082Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-finds-38-security-flaws-in-electronic-health-record-platform-b77c1e</loc>
    <lastmod>2026-04-29T20:08:19.580Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-arrested-for-hijacking-and-selling-610-000-roblox-accounts-309b04</loc>
    <lastmod>2026-04-29T20:05:39.768Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-732-bytes-to-root-on-every-major-linux-distributions-xint-daedc6</loc>
    <lastmod>2026-04-30T21:09:51.915Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-732-bytes-to-root-c7b005</loc>
    <lastmod>2026-04-30T21:09:42.064Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/copy-fail-cve-2026-31431-is-a-linux-privilege-escalation-bug-that-lets-any-local-78b12c</loc>
    <lastmod>2026-04-30T19:10:00.255Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-31431-a-k-a-copyfail-gt-linux-lpe-gt-description-sounds-like-ai-slop-gt-ca1444</loc>
    <lastmod>2026-04-30T21:09:31.539Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/on-2026-04-02-a-threat-actor-contacted-digicert-s-support-team-via-a-customer-ch-7023aa</loc>
    <lastmod>2026-04-30T21:09:16.646Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-domain-suspension-service-and-a-methodology-kit-on-a-9e2140</loc>
    <lastmod>2026-04-30T19:09:53.475Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-previously-unpatched-cpanel-information-disclosure-v-035472</loc>
    <lastmod>2026-04-30T18:10:00.879Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-russian-speaking-threat-actor-group-is-recruiting-an-initial-access-broker-iab-2b4c69</loc>
    <lastmod>2026-04-30T19:09:36.937Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/offshore-lc-bulletproof-infrastructure-6e989c</loc>
    <lastmod>2026-04-29T18:06:06.792Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aman-resorts-and-vimeo-have-been-leaked-by-shinyhunters-https-t-co-gofik0bljs-b737d9</loc>
    <lastmod>2026-04-30T17:10:01.522Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-ezcloud-https-t-co-dz59nwzsrs-the-first-vietnamese-company-to-provide-hotel--299cb0</loc>
    <lastmod>2026-04-30T18:09:36.426Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/most-teams-patch-by-severity-but-low-risk-bugs-can-become-high-impact-when-chain-4bc757</loc>
    <lastmod>2026-04-30T18:09:43.995Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack-14d346</loc>
    <lastmod>2026-04-30T15:09:58.926Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-ai-powered-bluekit-phishing-kit-targets-major-platforms-with-mfa-bypass-atta-be1d5b</loc>
    <lastmod>2026-04-30T13:09:30.913Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/polymarket-rejects-data-breach-claims-as-hacker-alleges-300k-records-stolen-b08d72</loc>
    <lastmod>2026-04-29T18:05:35.694Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-0056113-selling-compromised-law-enforcement-emails-and-edr-as-a-ser-bf646c</loc>
    <lastmod>2026-04-30T10:09:55.097Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-0056113-selling-compromised-law-enforcement-emails-and-edr-as-a-ser-d348f7</loc>
    <lastmod>2026-04-30T06:09:52.931Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-3120d8</loc>
    <lastmod>2026-04-30T13:10:05.558Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202404507-8e4e0a</loc>
    <lastmod>2026-04-30T14:09:57.886Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-6bd079</loc>
    <lastmod>2026-04-30T15:09:35.817Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-whm-emergency-update-fixes-critical-auth-bypass-bug-6e0e18</loc>
    <lastmod>2026-04-29T16:09:27.682Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats-b4eb38</loc>
    <lastmod>2026-04-30T17:09:43.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/preparafaculdade-a-large-brazilian-educational-platform-used-for-pre-vestibular--2313de</loc>
    <lastmod>2026-04-30T11:09:55.589Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/movilnet-venezuela-s-state-owned-mobile-telecommunications-operator-has-allegedl-150f3a</loc>
    <lastmod>2026-04-30T13:09:12.664Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/puerto-inteligente-seguro-pis-a-mexican-government-program-under-the-administrac-eb52ee</loc>
    <lastmod>2026-04-30T11:09:36.751Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/your-yaml-files-hold-more-credentials-than-most-production-servers-the-ghostacti-12a3e6</loc>
    <lastmod>2026-04-30T13:09:20.850Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vect-2-0-ransomware-acts-as-wiper-thanks-to-design-error-16dbc7</loc>
    <lastmod>2026-04-29T16:08:09.793Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/learning-from-the-vercel-breach-shadow-ai-oauth-sprawl-300bcf</loc>
    <lastmod>2026-04-29T14:08:13.648Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/github-fixes-rce-flaw-that-gave-access-to-millions-of-private-repos-abec34</loc>
    <lastmod>2026-04-29T14:08:22.212Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fresh-litellm-vulnerability-exploited-shortly-after-disclosure-e01841</loc>
    <lastmod>2026-04-29T14:05:37.217Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hundreds-of-internet-facing-vnc-servers-expose-ics-ot-fa3bc3</loc>
    <lastmod>2026-04-29T14:05:48.672Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lotus-wiper-attack-targets-venezuelan-energy-firms-utilities-097154</loc>
    <lastmod>2026-04-30T10:09:39.225Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apd-gba-belgium-86-2026-167f7e</loc>
    <lastmod>2026-04-30T09:10:04.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day-7ba972</loc>
    <lastmod>2026-04-29T12:07:36.025Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-cpanel-authentication-vulnerability-identified-update-your-server-immed-75d6fd</loc>
    <lastmod>2026-04-30T06:10:00.554Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-estonian-suspect-arrested-over-alleged-scattered-spider-cyberattacks-a0cbac</loc>
    <lastmod>2026-04-29T12:07:14.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-confirms-data-stolen-in-supply-chain-attack-4ce563</loc>
    <lastmod>2026-04-29T12:06:50.133Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/iranian-cyber-group-handala-targets-us-troops-in-bahrain-0bfba7</loc>
    <lastmod>2026-04-29T17:06:36.387Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/that-ps-code-will-get-the-txt-dns-record-of-sagi-chatcamic-com-write-the-content-c80dde</loc>
    <lastmod>2026-04-29T12:06:32.566Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-the-txt-dns-record-of-sagiw-chatcamic-com-there-is-some-ps-code-1-2-https-t-c-e5e849</loc>
    <lastmod>2026-04-29T12:06:39.891Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kb-c2-panel-http-185-102-115-84-4000-login-https-t-co-4yauh4gli3-c2abb9</loc>
    <lastmod>2026-04-29T11:05:19.089Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ce-482872-d12d45</loc>
    <lastmod>2026-04-29T10:06:24.473Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cnil-france-san-2025-014-970bb2</loc>
    <lastmod>2026-04-29T10:06:39.768Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-e7a4ad</loc>
    <lastmod>2026-04-30T05:10:03.944Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev-e9674f</loc>
    <lastmod>2026-04-30T11:09:28.762Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cursor-ai-ide-vulnerability-allows-code-execution-via-hidden-git-hooks-ff9e1d</loc>
    <lastmod>2026-04-29T10:06:59.691Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/38-vulnerabilities-found-in-openemr-medical-software-916120</loc>
    <lastmod>2026-04-29T10:05:35.506Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chrome-147-firefox-150-security-updates-rolling-out-36975d</loc>
    <lastmod>2026-04-29T11:05:55.187Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-github-vulnerability-exposed-millions-of-repositories-20116a</loc>
    <lastmod>2026-04-30T01:09:53.400Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-33c3be</loc>
    <lastmod>2026-04-30T02:09:52.560Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-5347a7</loc>
    <lastmod>2026-04-30T01:10:03.382Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure-224f62</loc>
    <lastmod>2026-04-30T01:09:45.030Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/april-27th-what-happened-with-our-feature-flag-configuration-the-clickup-blog-39ffd9</loc>
    <lastmod>2026-04-29T22:09:46.204Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cpanel-just-released-a-critical-security-vulnerability-notification-what-critica-a56464</loc>
    <lastmod>2026-04-29T00:09:12.344Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-dhl-phishing-scam-uses-11-step-attack-chain-to-steal-passwords-f6ad2c</loc>
    <lastmod>2026-04-28T22:09:33.731Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bluenoroff-uses-fake-zoom-calls-to-turn-victims-into-attack-lures-17150b</loc>
    <lastmod>2026-04-28T22:09:23.681Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/feuding-ransomware-groups-leak-each-other-s-data-b36319</loc>
    <lastmod>2026-04-29T22:09:37.625Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/broken-vect-2-0-ransomware-acts-as-a-data-wiper-for-large-files-d17f5e</loc>
    <lastmod>2026-04-28T22:08:50.124Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw-4d2f99</loc>
    <lastmod>2026-04-28T22:09:06.733Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-spm-cdn-assets-dist-2026-s3-us-east-2-amazonaws-com-bootstrap-sh-system-pe-574559</loc>
    <lastmod>2026-04-28T21:08:28.044Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/creedx-monstergateway-a-brazilian-white-label-payment-gateway-supporting-pix-bol-207716</loc>
    <lastmod>2026-04-29T20:09:46.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/video-service-vimeo-confirms-anodot-breach-exposed-user-data-a6b007</loc>
    <lastmod>2026-04-28T20:08:15.635Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-sing-00d19a</loc>
    <lastmod>2026-04-29T19:09:53.723Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cyber-insurance-data-gives-cisos-new-ammo-for-budget-talks-f4b3ac</loc>
    <lastmod>2026-04-29T19:09:44.712Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-two-known-exploited-vulnerabilities-to-catalog-095e4c</loc>
    <lastmod>2026-04-29T19:09:34.889Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vidar-rises-to-top-of-chaotic-infostealer-market-1a5291</loc>
    <lastmod>2026-04-28T20:07:50.362Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/realt-https-t-co-ub9prc2hmx-a-fintech-and-crypto-platform-for-investing-in-real--336725</loc>
    <lastmod>2026-04-29T13:09:59.937Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campa-21b0d4</loc>
    <lastmod>2026-04-29T13:09:53.354Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pack2theroot-12-year-old-linux-packagekit-flaw-enables-full-compromise-846402</loc>
    <lastmod>2026-04-29T13:09:43.313Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vimeo-confirms-user-and-customer-data-breach-6e3f4b</loc>
    <lastmod>2026-04-28T18:05:17.031Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-a-new-infostealer-called-yellow-stealer-is-being-sold-on-a-popular-cybercrim-8def46</loc>
    <lastmod>2026-04-29T08:09:57.120Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/1-2-renap-registro-nacional-de-las-personas-and-sat-superintendencia-de-administ-e0be6e</loc>
    <lastmod>2026-04-29T09:09:58.090Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/polymarket-the-decentralized-prediction-market-platform-has-allegedly-been-breac-3c4a61</loc>
    <lastmod>2026-04-29T08:09:47.899Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fondo-nacional-de-garantias-fga-a-colombian-credit-guarantee-fund-supporting-peo-125ac4</loc>
    <lastmod>2026-04-29T07:09:57.392Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nemea-group-a-major-french-real-estate-and-apart-hotel-operator-has-allegedly-be-eb21e7</loc>
    <lastmod>2026-04-29T08:09:35.833Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-reportedly-charges-scattered-spider-hacker-arrested-in-finland-a7664f</loc>
    <lastmod>2026-04-28T16:07:06.076Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data-b55ba1</loc>
    <lastmod>2026-04-28T16:07:17.595Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi-b9ddf1</loc>
    <lastmod>2026-04-29T07:09:50.696Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/robinhood-vulnerability-exploited-for-phishing-attacks-bae023</loc>
    <lastmod>2026-04-28T16:06:49.785Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fresh-wave-of-glassworm-vs-code-extensions-slices-through-supply-chain-53e371</loc>
    <lastmod>2026-04-28T16:06:27.993Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-civil-defense-of-amazonas-https-t-co-1cjbluzrzt-a-brazilian-state-government-db4ee7</loc>
    <lastmod>2026-04-29T07:09:32.928Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chicago-teen-19-linked-to-international-scattered-spider-hacking-ring-prosecutor-e4d12b</loc>
    <lastmod>2026-04-29T04:09:56.841Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ingressolive-a-brazilian-online-platform-and-mobile-app-for-creating-managing-an-e84d7b</loc>
    <lastmod>2026-04-29T06:10:00.969Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lg-berlin-2-o-202-24-326439</loc>
    <lastmod>2026-04-29T06:09:38.979Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ransom-note-did-not-follow-the-normal-lockbit-format-directing-victims-to-a--303e69</loc>
    <lastmod>2026-04-29T05:09:47.636Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/detection-insight-suspicious-accdr-dropper-activity-possible-bitter-tradecraft-a-409907</loc>
    <lastmod>2026-04-29T05:09:40.583Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cnil-france-san-2025-011-c6e23c</loc>
    <lastmod>2026-04-28T14:09:22.735Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vg-wiesbaden-6-k-996-22-wi-873c96</loc>
    <lastmod>2026-04-28T14:09:38.968Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-an-opsec-playbook-how-threat-actors-evade-detection-2bdf91</loc>
    <lastmod>2026-04-28T14:09:14.030Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about-a7d146</loc>
    <lastmod>2026-04-29T05:09:32.059Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-chinese-state-hacker-extradited-to-us-6141ed</loc>
    <lastmod>2026-04-28T14:08:07.576Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dozens-of-open-vsx-extension-clones-linked-to-glassworm-malware-6d3281</loc>
    <lastmod>2026-04-28T14:08:18.010Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/after-mythos-new-playbooks-for-a-zero-window-era-7bce9c</loc>
    <lastmod>2026-04-29T04:09:50.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-unauthenticated-rce-9f92ed</loc>
    <lastmod>2026-04-29T04:09:41.640Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-linux-firestarter-backdoor-targets-cisco-firepower-devices-e1a491</loc>
    <lastmod>2026-04-28T12:08:23.911Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/electric-motorcycles-and-scooters-face-hacking-risks-to-security-and-rider-safet-ca4588</loc>
    <lastmod>2026-04-28T12:05:41.041Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/no-patch-for-new-phantomrpc-privilege-escalation-technique-in-windows-b92c73</loc>
    <lastmod>2026-04-28T12:05:52.577Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/germany-suspects-russia-is-behind-signal-phishing-that-targeted-top-officials-fcc25d</loc>
    <lastmod>2026-04-28T12:08:13.147Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/also-related-fake-captcha-page-https-screenly-cam-command-cmd-c-curl-sko-temp-ms-60c8e4</loc>
    <lastmod>2026-04-28T11:08:10.371Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202406208-efafeb</loc>
    <lastmod>2026-04-28T10:07:07.498Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-silk-typhoon-hacker-extradited-to-u-s-over-covid-research-cyberattacks-c3fa25</loc>
    <lastmod>2026-04-29T01:10:02.972Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover-d827c4</loc>
    <lastmod>2026-04-28T23:10:02.291Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202-6db151</loc>
    <lastmod>2026-04-29T00:09:53.807Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/medtronic-hack-confirmed-after-shinyhunters-threatens-data-leak-0be119</loc>
    <lastmod>2026-04-28T23:09:50.990Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-4bde14</loc>
    <lastmod>2026-04-28T23:09:43.253Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vimeo-claimed-by-shinyhunters-https-t-co-boe4qz3w6z-bea412</loc>
    <lastmod>2026-04-28T08:08:35.263Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-national-extradited-to-us-for-pandemic-era-silk-typhoon-attacks-e500d4</loc>
    <lastmod>2026-04-28T08:08:28.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/robinhood-account-creation-flaw-abused-to-send-phishing-emails-75879c</loc>
    <lastmod>2026-04-28T09:09:38.013Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-smtp-and-aws-ses-accounts-on-a-popular-cyber-7d1b01</loc>
    <lastmod>2026-04-28T09:09:23.720Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-active-directory-dumper-amp-vpn-checker-v2-0-263a81</loc>
    <lastmod>2026-04-28T09:08:50.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-combines-social-engineering-malware-cloud-abuse-ae61f5</loc>
    <lastmod>2026-04-28T18:10:03.579Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/daily-dose-of-dark-web-informer-april-27th-2026-42c87f</loc>
    <lastmod>2026-04-28T08:09:53.677Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-full-backup-of-an-unnamed-crypto-b2b-affil-5ecc90</loc>
    <lastmod>2026-04-28T08:09:20.250Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/glassworm-malware-attacks-return-via-73-openvsx-sleeper-extensions-91d477</loc>
    <lastmod>2026-04-28T07:09:04.845Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/canada-arrests-three-for-operating-sms-blaster-device-in-toronto-ab2782</loc>
    <lastmod>2026-04-28T07:09:31.604Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-react2shell-exploitation-toolkit-on-a-popu-82ad47</loc>
    <lastmod>2026-04-28T18:09:42.183Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/82-chrome-extensions-found-selling-user-data-6-5-million-users-affected-58b095</loc>
    <lastmod>2026-04-28T07:08:26.476Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-9870014-261cad</loc>
    <lastmod>2026-04-28T07:08:08.208Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/alleged-silk-typhoon-hacker-extradited-to-us-for-cyberespionage-c088a7</loc>
    <lastmod>2026-04-28T06:09:46.943Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/how-big-a-threat-are-iranian-backed-cyberattacks-bedd3e</loc>
    <lastmod>2026-04-28T06:09:32.831Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/totalenergies-a-major-french-energy-company-that-produces-and-sells-oil-gas-and--2d7542</loc>
    <lastmod>2026-04-28T17:09:57.796Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-university-of-san-carlos-of-guatemala-usac-has-allegedly-been-breached-with--932dc9</loc>
    <lastmod>2026-04-28T17:09:37.569Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-leaks-data-of-udemy-zara-7-eleven-in-salesforce-linked-breach-5246ab</loc>
    <lastmod>2026-04-28T05:09:48.776Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/senators-seek-answers-about-hackers-obtaining-sensitive-student-data-from-ostens-8e20f9</loc>
    <lastmod>2026-04-28T05:09:17.007Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lcbo-liquor-control-board-of-ontario-database-breached-165-840-customer-records--78be1a</loc>
    <lastmod>2026-04-28T05:08:30.536Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/den-kulturelle-skolesekken-dks-database-breached-1-389-534-records-exposed-from--519a7d</loc>
    <lastmod>2026-04-28T05:07:08.390Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/choice-health-insurance-has-allegedly-been-breached-with-2-1-million-client-and--7a0631</loc>
    <lastmod>2026-04-28T05:06:13.176Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pypi-package-with-1-1m-monthly-downloads-hacked-to-push-infostealer-f80278</loc>
    <lastmod>2026-04-28T05:05:33.205Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/home-security-giant-adt-data-breach-affects-5-5-million-people-c0b3e2</loc>
    <lastmod>2026-04-28T05:05:43.639Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-atta-4d29a9</loc>
    <lastmod>2026-04-28T15:09:51.685Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unpatched-phantomrpc-flaw-in-windows-enables-privilege-escalation-6dc09b</loc>
    <lastmod>2026-04-28T05:05:23.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10241537-4acad8</loc>
    <lastmod>2026-04-28T15:09:42.466Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-controls-90-of-rare-earth-processing-state-sponsored-cyber-operations-targ-05125c</loc>
    <lastmod>2026-04-28T09:09:44.540Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/blackfile-actively-extorting-data-theft-victims-in-retail-and-hospitality-sector-1ab0ec</loc>
    <lastmod>2026-04-28T08:08:09.047Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ctt-correios-de-portugal-portugal-s-national-postal-carrier-has-allegedly-been-b-bddd04</loc>
    <lastmod>2026-04-28T07:07:52.953Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-ministerio-de-trabajo-y-prevision-social-ministry-of-labor-and-social-welfar-7a5127</loc>
    <lastmod>2026-04-28T07:09:20.643Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/medtronic-confirms-breach-after-hackers-claim-9-million-records-theft-8158e2</loc>
    <lastmod>2026-04-28T06:07:45.719Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/money-launderer-linked-to-230m-crypto-heist-gets-70-months-in-prison-e9d4dc</loc>
    <lastmod>2026-04-28T06:08:08.554Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/deepfake-voice-attacks-are-outpacing-defenses-what-security-leaders-should-know-bbf926</loc>
    <lastmod>2026-04-28T06:08:30.542Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mythos-changed-the-math-on-vulnerability-discovery-most-teams-aren-t-ready-for-t-070e48</loc>
    <lastmod>2026-04-28T13:09:59.359Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware-b8b132</loc>
    <lastmod>2026-04-29T18:10:00.623Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks-a0d3ca</loc>
    <lastmod>2026-05-14T04:09:05.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-hackers-exploit-microsoft-teams-to-deploy-snow-malware-60cc8b</loc>
    <lastmod>2026-04-28T06:07:37.398Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/incomplete-windows-patch-opens-door-to-zero-click-attacks-f4ab17</loc>
    <lastmod>2026-04-28T06:06:43.345Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/openssh-flaw-allowing-full-root-shell-access-lurked-for-15-years-fe82d7</loc>
    <lastmod>2026-04-28T06:06:51.402Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/malicious-ai-prompt-injection-attacks-increasing-but-sophistication-still-low-go-76015e</loc>
    <lastmod>2026-04-28T06:07:12.791Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/20-year-old-malware-rewrites-history-of-cyber-sabotage-aff86e</loc>
    <lastmod>2026-04-28T05:10:04.277Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/aepd-spain-exp202404507-4e20da</loc>
    <lastmod>2026-04-28T13:09:41.843Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-uses-email-bombing-social-engineering-to-deploy-snow-malware-300e4e</loc>
    <lastmod>2026-04-27T12:05:42.628Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/easily-exploitable-pack2theroot-linux-vulnerability-leads-to-root-access-f4aa12</loc>
    <lastmod>2026-04-27T19:05:27.959Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vidar-infostealer-spreads-via-fake-captchas-hides-in-jpeg-and-txt-files-456159</loc>
    <lastmod>2026-04-27T12:07:07.553Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-launches-sweeping-crackdown-on-southeast-asia-cyberscams-and-sanctions-cambod-b29920</loc>
    <lastmod>2026-04-27T10:09:51.655Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firefox-vulnerability-allows-tor-user-fingerprinting-946dff</loc>
    <lastmod>2026-04-27T10:10:01.275Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud-ab6cca</loc>
    <lastmod>2026-04-27T10:09:36.986Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/adt-and-udemy-salesforce-data-dumped-by-shinyhunters-https-t-co-poeoircxvy-574c8e</loc>
    <lastmod>2026-04-26T21:06:43.195Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-entra-agent-id-flaw-enabled-tenant-takeover-via-privilege-escalation-59504e</loc>
    <lastmod>2026-04-26T20:06:33.568Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/gruppo-cap-cap-holding-s-p-a-the-water-and-wastewater-management-company-serving-194d8a</loc>
    <lastmod>2026-04-26T19:06:47.428Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-aspx-webshell-access-with-network-admin-priv-1c949b</loc>
    <lastmod>2026-04-26T19:06:54.337Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-phishing-as-a-service-platform-called-blue-751b31</loc>
    <lastmod>2026-04-26T18:05:36.704Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-pdf-exploit-builder-advertised-as-100-fud--5f327a</loc>
    <lastmod>2026-04-26T18:06:19.947Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/get-covered-a-u-s-based-renters-insurance-platform-has-allegedly-been-breached-w-cf591f</loc>
    <lastmod>2026-04-26T18:06:35.641Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-rxtlgfcnqi-a-french-short-term-rental-property-booking-platform-has-a-7e0677</loc>
    <lastmod>2026-04-26T17:05:42.136Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/american-utility-firm-itron-discloses-breach-of-internal-it-network-4279be</loc>
    <lastmod>2026-04-26T16:05:55.391Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/https-t-co-j2okvkqv43-grupo-abril-the-brazilian-media-group-responsible-for-site-e45aa9</loc>
    <lastmod>2026-04-26T16:05:14.222Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hospital-brisas-a-panama-based-hospital-founded-in-2018-has-allegedly-been-breac-bb3cfe</loc>
    <lastmod>2026-04-26T16:05:28.534Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-offering-government-and-police-email-access-for-emer-ee47b9</loc>
    <lastmod>2026-04-26T16:10:02.332Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lapsus-group-claims-3-victims-mapfre-vodafone-checkmarx-https-t-co-2c2swqzmvu-c1cc1e</loc>
    <lastmod>2026-04-26T00:08:20.493Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/litecoin-has-confirmed-a-zero-day-bug-caused-a-dos-attack-that-disrupted-major-m-b4cc9c</loc>
    <lastmod>2026-04-25T22:08:05.174Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-allegedly-selling-a-3tb-iranian-military-database-tied-to-ogha-82ab39</loc>
    <lastmod>2026-04-25T21:08:16.502Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/agelessrx-a-u-s-based-telehealth-platform-focused-on-longevity-and-anti-aging-me-56f326</loc>
    <lastmod>2026-04-25T21:08:23.961Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-simplex29-is-selling-an-alleged-data-br-6387a8</loc>
    <lastmod>2026-04-25T19:07:42.830Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/banco-falabella-s-debt-collection-service-falabella-cobranza-iserra-bogota-and-m-e85814</loc>
    <lastmod>2026-04-25T19:08:19.949Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/salama-islamic-arab-insurance-company-https-t-co-spvle6t26s-one-of-the-uae-s-lar-31b461</loc>
    <lastmod>2026-04-25T18:08:01.474Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bell-canada-https-t-co-jkcv0yzqyw-bell-mobility-one-of-canada-s-three-largest-te-744755</loc>
    <lastmod>2026-04-25T17:09:34.549Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-critical-insecure-direct-object-reference-idor-vulne-60a9fd</loc>
    <lastmod>2026-04-25T16:08:27.441Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware-f35dcb</loc>
    <lastmod>2026-04-25T16:08:13.923Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fake-captcha-scam-abuses-verification-clicks-to-send-costly-international-texts-ffb12f</loc>
    <lastmod>2026-04-25T12:08:03.100Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-linked-apt-gopherwhisper-abuses-legitimate-services-in-government-attacks-5ec0c3</loc>
    <lastmod>2026-04-30T09:07:42.403Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/discord-sleuths-gained-unauthorized-access-to-anthropic-s-mythos-db6811</loc>
    <lastmod>2026-04-25T12:07:45.793Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software-c6e97f</loc>
    <lastmod>2026-04-25T11:09:19.770Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline-ff0558</loc>
    <lastmod>2026-05-11T13:08:31.073Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/adt-confirms-data-breach-after-shinyhunters-leak-threat-fc93e0</loc>
    <lastmod>2026-04-25T00:06:40.961Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-npm-threat-landscape-attack-surface-and-mitigations-b626a9</loc>
    <lastmod>2026-04-25T00:06:30.952Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shai-hulud-changed-npm-supply-chain-attacks-adversaries-now-use-wormable-propaga-08ffee</loc>
    <lastmod>2026-04-24T23:06:54.203Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threat-actor-vmoreal-is-actively-seeking-new-suppliers-of-corporate-network-acce-05990c</loc>
    <lastmod>2026-04-24T23:06:20.771Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-clickfix-attack-hides-in-native-windows-tools-to-reduce-detection-risk-78bb0f</loc>
    <lastmod>2026-04-24T22:05:48.607Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firestarter-malware-survives-cisco-firewall-updates-security-patches-678451</loc>
    <lastmod>2026-04-25T18:10:04.230Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cracks-in-the-bedrock-agent-god-mode-eeca0a</loc>
    <lastmod>2026-04-24T22:05:23.877Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/our-research-reveals-agent-god-mode-in-amazon-bedrock-agentcore-overly-broad-iam-731c51</loc>
    <lastmod>2026-04-24T22:05:14.699Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-on-a-cybercrime-forum-is-advertising-a-mobile-malware-toolkit-tar-2ee7c6</loc>
    <lastmod>2026-04-24T21:05:12.945Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april-2341f7</loc>
    <lastmod>2026-04-24T20:08:03.006Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-blackfile-extortion-group-linked-to-surge-of-vishing-attacks-2c44dc</loc>
    <lastmod>2026-04-24T23:08:26.761Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-universidad-peruana-de-ciencias-aplicadas-upc-one-of-peru-s-largest-private--fdb9a5</loc>
    <lastmod>2026-04-24T19:06:39.281Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/v2-of-the-kali365-phaas-toolkit-has-emerged-with-dedicated-oauth-and-ai-based-lu-85ebc7</loc>
    <lastmod>2026-04-24T19:06:45.923Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-pack2theroot-flaw-gives-hackers-root-linux-access-7557c2</loc>
    <lastmod>2026-04-24T18:09:28.687Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patche-4ad217</loc>
    <lastmod>2026-05-04T10:08:43.607Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-four-known-exploited-vulnerabilities-to-catalog-e8a5ef</loc>
    <lastmod>2026-04-25T15:09:46.409Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cve-2026-32223-windows-usb-printing-stack-usbprint-sys-elevation-of-privilege-vu-c9eac7</loc>
    <lastmod>2026-04-24T18:08:04.085Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/four-vulnerabilities-have-been-added-to-the-cisa-kev-catalog-cve-2025-29635-d-li-4d8051</loc>
    <lastmod>2026-04-25T15:09:46.029Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/here-s-what-we-found-this-wasn-t-built-to-steal-files-or-lock-screens-it-was-bui-21c4ba</loc>
    <lastmod>2026-04-24T18:07:49.438Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-history-of-cyberwar-just-got-rewritten-labssentinel-has-discovered-fast16-a--396c4a</loc>
    <lastmod>2026-04-24T18:07:57.740Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/emerging-enterprise-security-risks-of-ai-c33e7b</loc>
    <lastmod>2026-04-24T19:09:45.171Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dora-and-operational-resilience-credential-management-as-a-financial-risk-contro-151bd3</loc>
    <lastmod>2026-04-24T17:09:59.479Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/le-petit-vapoteur-https-t-co-hb7uiyvmo0-one-of-france-s-biggest-online-vape-reta-018be5</loc>
    <lastmod>2026-04-24T17:09:50.284Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-private-telegram-group-chat-of-shinyhunters-one-of-the-most-prolific-cybercr-f7fb8c</loc>
    <lastmod>2026-04-24T17:09:18.971Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-novav1-is-selling-an-android-spyware-pr-227899</loc>
    <lastmod>2026-04-24T17:09:34.165Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-s-defense-software-7a6551</loc>
    <lastmod>2026-04-24T16:09:23.958Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/pre-stuxnet-sabotage-malware-fast16-linked-to-us-iran-cyber-tensions-2dd0d0</loc>
    <lastmod>2026-04-24T16:07:42.129Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/in-other-news-unauthorized-mythos-access-plankey-cisa-nomination-ends-new-displa-ba501b</loc>
    <lastmod>2026-04-24T16:07:52.773Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-malware-binder-tool-branded-universal-file-binder-2026-is-being-sold-on-a-popu-d4d1a8</loc>
    <lastmod>2026-04-24T15:08:10.682Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-known-as-seacoat-has-made-available-an-alleged-dataset-dump-from--14b351</loc>
    <lastmod>2026-04-24T15:08:33.796Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/over-10-000-zimbra-servers-vulnerable-to-ongoing-xss-attacks-d3c059</loc>
    <lastmod>2026-04-25T06:09:19.395Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korea-s-lazarus-targets-macos-users-via-clickfix-c61d15</loc>
    <lastmod>2026-04-24T14:09:11.400Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/teampcp-hijacks-bitwarden-cli-uses-dependabot-to-deploy-shai-hulud-malware-76936e</loc>
    <lastmod>2026-04-24T15:09:24.772Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-scanner-relies-on-an-acquirer-file-containing-targets-and-a-lease-file-defin-468022</loc>
    <lastmod>2026-04-24T13:08:10.673Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/french-police-arrest-hexdex-hacker-over-mass-data-theft-and-leaks-49ed6d</loc>
    <lastmod>2026-04-24T12:05:35.818Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-federal-agency-s-cisco-firewall-infected-with-firestarter-backdoor-4eeb79</loc>
    <lastmod>2026-04-24T12:05:18.405Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases-848534</loc>
    <lastmod>2026-04-25T03:09:27.042Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/phantomrpc-a-new-privilege-escalation-technique-in-windows-rpc-00d762</loc>
    <lastmod>2026-04-24T11:09:47.506Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2-8ccdf0</loc>
    <lastmod>2026-04-25T05:09:06.488Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure-a7af71</loc>
    <lastmod>2026-04-25T21:09:43.723Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vulnerabilities-patched-in-crowdstrike-tenable-products-ed9a44</loc>
    <lastmod>2026-04-24T10:09:34.114Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-npm-package-hit-in-supply-chain-attack-bf90ac</loc>
    <lastmod>2026-04-24T10:09:45.536Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/tropic-trooper-apt-takes-aim-at-home-routers-japanese-targets-321bb5</loc>
    <lastmod>2026-04-24T02:08:23.726Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-attack-fallout-expands-to-more-customers-and-third-party-systems-b421e7</loc>
    <lastmod>2026-04-24T00:08:16.938Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-threats-in-the-wild-the-current-state-of-prompt-injections-on-the-web-649e6c</loc>
    <lastmod>2026-04-24T00:08:41.784Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/newly-deciphered-sabotage-malware-may-have-targeted-iran-s-nuclear-program-and-p-a057e6</loc>
    <lastmod>2026-04-24T00:08:33.228Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/china-backed-hackers-are-industrializing-botnets-2aa7ec</loc>
    <lastmod>2026-04-24T00:08:22.958Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage--a1d4ae</loc>
    <lastmod>2026-05-20T11:07:17.428Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-history-of-cyberwar-just-got-rewritten-with-a-new-labssentinel-discovery-by--15ea2a</loc>
    <lastmod>2026-04-23T23:07:33.907Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin-d7312d</loc>
    <lastmod>2026-04-23T22:05:27.567Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/us-uk-agencies-warn-hackers-were-hiding-on-cisco-firewalls-long-after-patches-we-64719d</loc>
    <lastmod>2026-04-23T22:05:19.444Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-fbi-the-uk-s-ncsc-and-international-partners-have-issued-a-joint-advisory-al-95b57f</loc>
    <lastmod>2026-04-24T07:10:06.082Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware-e2acd5</loc>
    <lastmod>2026-04-24T11:09:57.469Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dragos-despite-ai-use-new-malware-targeting-water-plants-is-hype-594a4a</loc>
    <lastmod>2026-04-24T07:09:37.864Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-t-e25d2b</loc>
    <lastmod>2026-04-24T07:09:46.779Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-a3bc27</loc>
    <lastmod>2026-04-24T06:09:50.318Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-dataset-allegedly-obtained-from-bodyhit-club-https-t-e15186</loc>
    <lastmod>2026-04-24T05:09:58.040Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-known-as-kim1000p-is-selling-an-alleged-dataset-containing-80-mil-a6e50b</loc>
    <lastmod>2026-04-24T05:10:04.516Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data-5d8217</loc>
    <lastmod>2026-04-24T04:10:03.330Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials-2d962f</loc>
    <lastmod>2026-04-24T06:09:30.728Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/redirect-to-https-www-cisa-gov-news-events-directives-v1-ed-25-03-identify-and-m-41c7cf</loc>
    <lastmod>2026-04-24T04:09:45.469Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/nsa-joins-the-ncsc-and-others-in-releasing-joint-guidance-detailing-multiple-chi-bf9121</loc>
    <lastmod>2026-04-24T03:09:42.062Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-2021-atraf-breach-one-of-the-most-harmful-data-leaks-in-israel-s-history-is--15c220</loc>
    <lastmod>2026-04-24T03:10:00.208Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/day-9-ransomware-deployment-the-threat-actor-rdp-d-from-the-beachhead-to-backup--e885bd</loc>
    <lastmod>2026-04-24T04:09:39.336Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-statement-on-checkmarx-supply-chain-incident-the-bitwarden-security-te-d45c68</loc>
    <lastmod>2026-04-24T03:09:49.634Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-ve-updated-emergency-directive-25-03-in-response-to-cyber-threat-actors-using-9dfae1</loc>
    <lastmod>2026-04-24T04:09:31.772Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/harvester-apt-expands-spying-operations-with-new-gogra-linux-malware-7cfbbf</loc>
    <lastmod>2026-04-24T03:09:34.089Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-dozen-allied-agencies-say-china-is-building-covert-hacker-networks-out-of-ever-e0c5a0</loc>
    <lastmod>2026-04-24T03:09:19.673Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/carlson-software-vasco-b-gnss-receiver-5060be</loc>
    <lastmod>2026-04-23T23:09:42.469Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hangzhou-xiongmai-technology-co-ltd-xm530-ip-camera-de06d4</loc>
    <lastmod>2026-04-23T23:09:51.562Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/yadea-t5-electric-bicycle-006343</loc>
    <lastmod>2026-04-23T23:09:58.970Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/milesight-cameras-f82c59</loc>
    <lastmod>2026-04-24T01:09:56.776Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/intrado-911-emergency-gateway-egw-5b5d42</loc>
    <lastmod>2026-04-24T01:10:05.296Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/spicejet-online-booking-system-4a7777</loc>
    <lastmod>2026-04-24T02:10:03.846Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/arkansas-state-crime-lab-database-breached-threat-actor-kittykatkrew-leaks-court-d3d165</loc>
    <lastmod>2026-04-23T23:09:34.680Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/arkansas-state-crime-lab-database-breached-threat-actor-kittykatkrew-leaks-court-83c6d1</loc>
    <lastmod>2026-04-23T22:09:59.450Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool-bda927</loc>
    <lastmod>2026-04-23T22:09:52.491Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dark-web-informer-bc931e</loc>
    <lastmod>2026-04-24T11:09:10.268Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ants-agence-nationale-des-titres-securises-france-titres-the-french-government-a-40b59c</loc>
    <lastmod>2026-04-23T22:09:26.353Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/regular-password-resets-aren-t-as-safe-as-you-think-0629b2</loc>
    <lastmod>2026-04-23T22:09:12.705Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bad-memories-still-haunt-ai-agents-499e2f</loc>
    <lastmod>2026-04-23T21:09:42.715Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-apt-abuses-multiple-cloud-tools-to-spy-on-mongolia-010f90</loc>
    <lastmod>2026-04-23T21:09:36.298Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ico-uk-medialab-ai-inc-5263e7</loc>
    <lastmod>2026-04-23T18:10:04.290Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cnil-france-san-2026-002-2a247c</loc>
    <lastmod>2026-04-23T19:09:40.656Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-identified-as-mdghost-claims-to-have-compromised-a-uae-based-inve-5bf46e</loc>
    <lastmod>2026-04-23T16:09:04.411Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign-9bc390</loc>
    <lastmod>2026-04-23T16:08:50.882Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new--399418</loc>
    <lastmod>2026-05-21T09:07:35.568Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/firestarter-backdoor-dd20f4</loc>
    <lastmod>2026-04-23T20:08:39.470Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/project-glasswing-proved-ai-can-find-the-bugs-who-s-going-to-fix-them-8bdf83</loc>
    <lastmod>2026-04-23T15:09:03.528Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/uk-warns-of-chinese-hackers-using-proxy-networks-to-evade-detection-872ddb</loc>
    <lastmod>2026-04-23T14:08:52.802Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-gopherwhisper-apt-group-abuses-outlook-slack-discord-for-comms-cf7840</loc>
    <lastmod>2026-04-26T03:08:23.850Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/chinese-cybersecurity-firm-s-ai-hacking-claims-draw-comparisons-to-claude-mythos-433e6d</loc>
    <lastmod>2026-04-23T14:08:21.645Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/beyond-the-ai-control-surface-the-host-also-preserved-the-operator-s-alerting-an-237b42</loc>
    <lastmod>2026-04-23T13:08:48.787Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-orders-feds-to-patch-bluehammer-flaw-exploited-as-zero-day-2b173a</loc>
    <lastmod>2026-04-24T08:09:52.529Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/hackers-use-hidden-website-instructions-in-new-attacks-on-ai-assistants-07d4d1</loc>
    <lastmod>2026-04-23T18:08:14.112Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-behavioral-shift-why-trusted-relationships-are-the-newest-attack-surface-17f4be</loc>
    <lastmod>2026-04-23T12:09:40.888Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-can-autonomously-hack-cloud-systems-with-minimal-oversight-researchers-bb49a2</loc>
    <lastmod>2026-04-23T12:09:56.872Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10167745-682a15</loc>
    <lastmod>2026-04-23T12:09:17.233Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/defending-against-china-nexus-covert-networks-of-compromised-devices-6d029c</loc>
    <lastmod>2026-04-24T08:09:50.948Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-extracts-deleted-signal-messages-from-iphone-notification-database-schneier--2e763c</loc>
    <lastmod>2026-04-24T08:09:50.774Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/fbi-extracts-deleted-signal-messages-from-iphone-notification-database-https-t-c-3d897a</loc>
    <lastmod>2026-04-23T12:08:42.258Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/defending-against-china-nexus-covert-networks-of-compromised-devices-861574</loc>
    <lastmod>2026-04-23T13:08:08.256Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zealot-shows-what-ai-s-capable-of-in-staged-cloud-attack-4bbffa</loc>
    <lastmod>2026-04-23T10:09:05.149Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/recent-microsoft-defender-vulnerability-exploited-as-zero-day-c62c27</loc>
    <lastmod>2026-04-24T08:09:50.395Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-patches-ios-flaw-allowing-recovery-of-deleted-chats-1a5371</loc>
    <lastmod>2026-04-24T08:09:50.593Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach-d330be</loc>
    <lastmod>2026-04-23T10:08:09.659Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic--cdcc7f</loc>
    <lastmod>2026-04-24T08:09:50.107Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/trugreen-has-been-claimed-a-victim-to-inc-ransom-ransomware-https-t-co-brkgzeqxy-314e27</loc>
    <lastmod>2026-04-23T00:08:54.503Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/labscon25-replay-are-your-chinese-cameras-spying-for-you-or-on-you-89f783</loc>
    <lastmod>2026-04-22T23:08:48.698Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/is-your-40-doorbell-camera-a-security-asset-or-a-shadow-network-node-in-this-lab-083c64</loc>
    <lastmod>2026-04-22T23:08:40.966Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/cisa-adds-one-known-exploited-vulnerability-to-catalog-836c62</loc>
    <lastmod>2026-04-22T22:08:32.075Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/apple-fixes-ios-bug-that-retained-deleted-notification-data-c045e3</loc>
    <lastmod>2026-04-22T22:07:59.131Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-mirai-campaign-exploits-rce-flaw-in-eol-d-link-routers-cf26ec</loc>
    <lastmod>2026-04-23T00:08:30.767Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/shinyhunters-or-whoever-it-is-because-everyone-knows-it-all-has-leaked-6-more-co-c9393e</loc>
    <lastmod>2026-04-22T21:07:30.699Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows-5ffe18</loc>
    <lastmod>2026-04-22T20:07:08.869Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/discord-linked-group-accessed-anthropic-s-claude-mythos-ai-in-vendor-breach-6f4a7e</loc>
    <lastmod>2026-04-22T20:06:59.931Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-identified-as-ghostbyte-is-selling-super-admin-access-to-a-colomb-d6ea9a</loc>
    <lastmod>2026-04-22T20:06:50.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain-0cd956</loc>
    <lastmod>2026-04-22T20:06:41.665Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-tools-are-helping-mediocre-north-korean-hackers-steal-millions-098267</loc>
    <lastmod>2026-04-23T01:10:06.497Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/don-t-wait-for-a-patch-mitigate-redsun-zero-day-risk-in-microsoft-defender-today-f1ed52</loc>
    <lastmod>2026-04-23T01:09:56.406Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-ashborn-is-selling-an-alleged-database--7c14c2</loc>
    <lastmod>2026-04-22T21:09:48.613Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/sentinelone-s-autonomous-security-intelligence-asi-flagged-the-execution-pattern-a550d5</loc>
    <lastmod>2026-04-22T21:10:03.647Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/three-weeks-three-tier-1-supply-chain-attacks-sentinelone-stopped-all-three-from-a94198</loc>
    <lastmod>2026-04-23T01:09:35.869Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-zsenior-is-selling-a-dataset-containing-5a1f3a</loc>
    <lastmod>2026-04-22T21:09:41.330Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-cpu-z-attackers-deployed-three-separate-persistence-mechanisms-specifically--d348dc</loc>
    <lastmod>2026-04-22T21:09:56.052Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-token-69eea6</loc>
    <lastmod>2026-04-23T01:09:28.022Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/zirconite-https-t-co-fbftgq0ltn-an-official-commercial-partner-and-authorized-re-a176a8</loc>
    <lastmod>2026-04-22T20:09:52.512Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-is-selling-a-330-million-line-credit-card-compilation-labeled-cre-be9abf</loc>
    <lastmod>2026-04-22T19:10:01.959Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/inside-caller-as-a-service-fraud-the-scam-economy-has-a-hiring-process-89e29a</loc>
    <lastmod>2026-04-22T19:09:54.066Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/dprk-fake-job-scams-self-propagate-in-contagious-interview-824fa5</loc>
    <lastmod>2026-04-22T19:09:44.640Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/oracle-critical-patch-update-april-2026-security-update-review-296b7a</loc>
    <lastmod>2026-05-20T05:08:16.925Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/ai-hype-vs-reality-is-ai-really-rewriting-the-vulnerability-equation-1eaec9</loc>
    <lastmod>2026-04-22T16:05:44.627Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/the-cost-of-understanding-llm-driven-reverse-engineering-vs-iterative-llm-obfusc-febdbd</loc>
    <lastmod>2026-04-22T18:09:33.234Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/llms-have-gotten-good-enough-at-reverse-engineering-to-recover-source-code-from--052d8b</loc>
    <lastmod>2026-04-22T18:09:49.672Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/a-threat-actor-operating-under-the-alias-mdghost-claims-to-have-gained-complete--03bbe6</loc>
    <lastmod>2026-04-22T18:09:56.916Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/whql-signed-windows-kernel-driver-that-hands-any-user-mode-caller-an-arbitrary-m-8098f3</loc>
    <lastmod>2026-04-22T19:09:15.873Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api-d04ed9</loc>
    <lastmod>2026-04-22T18:09:42.384Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/we-identified-an-exposed-server-that-provided-unusual-visibility-into-a-large-sc-43da67</loc>
    <lastmod>2026-04-22T18:09:25.536Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/valkyrie-panel-https-momentum-effects-anderson-conferencing-trycloudflare-com-lo-5330ef</loc>
    <lastmod>2026-04-22T18:09:19.357Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens-c9f4dc</loc>
    <lastmod>2026-04-22T18:09:10.671Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-wiper-malware-targeted-venezuelan-energy-sector-prior-to-us-intervention-36718b</loc>
    <lastmod>2026-04-22T15:09:25.574Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/most-serious-cyberattacks-against-the-uk-now-from-russia-iran-and-china-cyber-ch-481684</loc>
    <lastmod>2026-04-22T17:09:20.034Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mustang-panda-hits-india-and-s-korea-with-updated-lotuslite-backdoor-316a40</loc>
    <lastmod>2026-04-22T14:06:05.262Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/bluesky-back-online-after-ddos-attack-as-iran-linked-313-team-takes-credit-05182c</loc>
    <lastmod>2026-04-22T14:06:13.919Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/new-gogra-malware-for-linux-uses-microsoft-graph-api-for-comms-e51bd9</loc>
    <lastmod>2026-04-22T12:06:05.687Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/north-korean-hackers-use-applescript-clickfix-in-fresh-macos-attacks-4d2704</loc>
    <lastmod>2026-04-22T13:10:03.043Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/mirai-botnet-targets-flaw-in-discontinued-d-link-routers-deab0c</loc>
    <lastmod>2026-04-22T12:09:54.551Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/are-sboms-failing-supply-chain-attacks-rise-as-security-teams-struggle-with-sbom-bd5c8a</loc>
    <lastmod>2026-04-22T13:09:17.005Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/claude-mythos-finds-271-firefox-vulnerabilities-235d7c</loc>
    <lastmod>2026-04-22T13:09:52.537Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/microsoft-patches-critical-asp-net-core-cve-2026-40372-privilege-escalation-bug-b5c0f3</loc>
    <lastmod>2026-04-23T02:09:13.693Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/toxic-combinations-when-cross-app-permissions-stack-into-risk-35c81b</loc>
    <lastmod>2026-04-22T16:09:47.617Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack-3dde21</loc>
    <lastmod>2026-04-22T13:09:27.581Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/and-smica83-uploaded-a-sample-to-bazaar-that-comes-from-85-239-144-4-ip-and-has--b5b87d</loc>
    <lastmod>2026-04-22T15:09:50.230Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10229191-7ee38e</loc>
    <lastmod>2026-04-23T02:09:13.521Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatnoir.com/article/garante-per-la-protezione-dei-dati-personali-italy-10233328-426701</loc>
    <lastmod>2026-04-22T11:09:17.801Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
</urlset>