<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 7, 2026 at 1:30 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://attackfeed.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>AttackFeed by Joe Wagner</title>
		<link><![CDATA[https://attackfeed.com]]></link>
		<description><![CDATA[AttackFeed by Joe Wagner]]></description>
		<lastBuildDate><![CDATA[Tue, 07 Apr 2026 17:28:36 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://attackfeed.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://attackfeed.com/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/]]></guid>
			<link><![CDATA[https://attackfeed.com/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/]]></link>
			<title>GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise &#8211;</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 17:28:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access-the-hacker-news/]]></link>
			<title>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:45:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/grafanaghost-vulnerability-allows-data-theft-via-ai-injection-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/grafanaghost-vulnerability-allows-data-theft-via-ai-injection-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>GrafanaGhost Vulnerability Allows Data Theft via AI Injection  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:44:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/russian-apt28-hackers-hijack-routers-to-steal-credentials-uk-security-agency-warns/]]></guid>
			<link><![CDATA[https://attackfeed.com/russian-apt28-hackers-hijack-routers-to-steal-credentials-uk-security-agency-warns/]]></link>
			<title>Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns &#8211;</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:28:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/grafanaghost-exploit-bypasses-ai-guardrails-for-silent-data-exfiltration/]]></guid>
			<link><![CDATA[https://attackfeed.com/grafanaghost-exploit-bypasses-ai-guardrails-for-silent-data-exfiltration/]]></link>
			<title>GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration &#8211;</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 15:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/grafanaghost-bypasses-grafanas-ai-defenses-without-leaving-a-trace-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/grafanaghost-bypasses-grafanas-ai-defenses-without-leaving-a-trace-cyberscoop/]]></link>
			<title>‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:31:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ai-agents-and-non-human-identities-creating-critical-security-gaps-report-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/ai-agents-and-non-human-identities-creating-critical-security-gaps-report-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>AI Agents and Non-Human Identities Creating Critical Security Gaps, Report  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:28:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign-the-hacker-news/]]></link>
			<title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:28:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/uk-exposes-russian-military-intelligence-hijacking-vulnerable-routers-for-cyber-attacks-all-feed/]]></guid>
			<link><![CDATA[https://attackfeed.com/uk-exposes-russian-military-intelligence-hijacking-vulnerable-routers-for-cyber-attacks-all-feed/]]></link>
			<title>UK exposes Russian military intelligence hijacking vulnerable routers for cyber attacks  &#8211; All Feed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:13:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/apt28-exploit-routers-to-enable-dns-hijacking-operations-all-feed/]]></guid>
			<link><![CDATA[https://attackfeed.com/apt28-exploit-routers-to-enable-dns-hijacking-operations-all-feed/]]></link>
			<title>APT28 exploit routers to enable DNS hijacking operations  &#8211; All Feed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:13:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/over-17bn-lost-to-cyber-fraud-in-the-last-year-warns-fbi/]]></guid>
			<link><![CDATA[https://attackfeed.com/over-17bn-lost-to-cyber-fraud-in-the-last-year-warns-fbi/]]></link>
			<title>Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI &#8211;</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:08:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/the-hidden-cost-of-recurring-credential-incidents-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/the-hidden-cost-of-recurring-credential-incidents-the-hacker-news/]]></link>
			<title>The Hidden Cost of Recurring Credential Incidents  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:28:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk-the-hacker-news/]]></link>
			<title>[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:28:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea-the-hacker-news/]]></link>
			<title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:27:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/storm-1175-exploits-flaws-in-high-velocity-medusa-attacks/]]></guid>
			<link><![CDATA[https://attackfeed.com/storm-1175-exploits-flaws-in-high-velocity-medusa-attacks/]]></link>
			<title>Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks &#8211;</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:58:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/building-secure-ai-data-pipelines-with-cryptobind-jisa-softech-pvt-ltd/]]></guid>
			<link><![CDATA[https://attackfeed.com/building-secure-ai-data-pipelines-with-cryptobind-jisa-softech-pvt-ltd/]]></link>
			<title>Building secure AI data pipelines with CryptoBind &#8211; JISA Softech Pvt Ltd</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:58:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips-the-hacker-news/]]></link>
			<title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:26:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploited/]]></guid>
			<link><![CDATA[https://attackfeed.com/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploited/]]></link>
			<title>Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited &#8211;</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:58:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/life-imprisonment-for-cambodian-scam-compound-operators-but-will-it-make-a-difference-graham-cluley/]]></guid>
			<link><![CDATA[https://attackfeed.com/life-imprisonment-for-cambodian-scam-compound-operators-but-will-it-make-a-difference-graham-cluley/]]></link>
			<title>Life imprisonment for Cambodian scam compound operators – but will it make a difference?  &#8211; GRAHAM CLULEY</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:21:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware-the-hacker-news/]]></link>
			<title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 08:13:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed-the-hacker-news/]]></link>
			<title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 05:59:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/fortinet-customers-confront-actively-exploited-zero-day-with-a-full-patch-still-pending-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/fortinet-customers-confront-actively-exploited-zero-day-with-a-full-patch-still-pending-cyberscoop/]]></link>
			<title>Fortinet customers confront actively exploited zero-day, with a full patch still pending  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:28:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations-the-hacker-news/]]></link>
			<title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:21:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release-cyberscoop/]]></link>
			<title>pcTattleTale stalkerware maker sentence includes fine, supervised release  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:15:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:13:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/⚡-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/⚡-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more-the-hacker-news/]]></link>
			<title>⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:13:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants-the-hacker-news/]]></link>
			<title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 05:52:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps-the-hacker-news/]]></link>
			<title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:13:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/why-security-researchers-and-red-teams-are-turning-to-workflow-automation-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/why-security-researchers-and-red-teams-are-turning-to-workflow-automation-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Why Security Researchers and Red Teams Are Turning to Workflow Automation  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:13:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/unc1069-targets-node-js-maintainers-via-fake-linkedin-slack-profiles-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/unc1069-targets-node-js-maintainers-via-fake-linkedin-slack-profiles-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>UNC1069 Targets Node.js Maintainers via Fake LinkedIn, Slack Profiles  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 17:03:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cloudflare-targets-wordpress-with-new-ai-powered-emdash-cms-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/cloudflare-targets-wordpress-with-new-ai-powered-emdash-cms-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Cloudflare Targets WordPress With New AI-Powered EmDash CMS  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:13:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation-the-hacker-news/]]></link>
			<title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 19:44:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers-the-hacker-news/]]></link>
			<title>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 19:29:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/browsergate-linkedin-tracks-6000-browser-extensions-on-users-pcs-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/browsergate-linkedin-tracks-6000-browser-extensions-on-users-pcs-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>BrowserGate: LinkedIn Tracks 6,000+ Browser Extensions on Users’ PCs  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 17:30:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-the-hacker-news/]]></link>
			<title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 05:52:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/north-korean-hackers-pose-as-trading-firm-to-steal-285m-from-drift-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/north-korean-hackers-pose-as-trading-firm-to-steal-285m-from-drift-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>North Korean Hackers Pose as Trading Firm to Steal $285M from Drift  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:09:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers-the-hacker-news/]]></link>
			<title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 12:58:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/a-vulnerability-in-fortinet-forticlientems-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac/]]></guid>
			<link><![CDATA[https://attackfeed.com/a-vulnerability-in-fortinet-forticlientems-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac/]]></link>
			<title>A Vulnerability in Fortinet FortiClientEMS Could Allow for Arbitrary Code Execution  &#8211; Cyber Security Advisories &#8211; MS-ISAC</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 11:14:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools-the-hacker-news/]]></link>
			<title>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 10:44:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks-the-hacker-news/]]></link>
			<title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 07:28:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab-krebs-on-security/]]></guid>
			<link><![CDATA[https://attackfeed.com/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab-krebs-on-security/]]></link>
			<title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab  &#8211; Krebs on Security</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 03:14:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/fake-chatgpt-ad-blocker-chrome-extension-caught-spying-on-users-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/fake-chatgpt-ad-blocker-chrome-extension-caught-spying-on-users-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 21:43:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/north-korean-hackers-abuse-github-to-spy-on-south-korean-firms-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/north-korean-hackers-abuse-github-to-spy-on-south-korean-firms-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>North Korean Hackers Abuse GitHub to Spy on South Korean Firms  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 19:28:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing-the-hacker-news/]]></link>
			<title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:21:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ai-future-the-leading-international-ai-and-web3-forum-to-take-place-in-april-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/ai-future-the-leading-international-ai-and-web3-forum-to-take-place-in-april-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>AI Future: The Leading International AI and Web3 Forum to Take Place in April  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:16:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ai-firm-mercor-confirms-breach-as-hackers-claim-4tb-of-stolen-data-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/ai-firm-mercor-confirms-breach-as-hackers-claim-4tb-of-stolen-data-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:16:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop-2/]]></guid>
			<link><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop-2/]]></link>
			<title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:14:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa-cyberscoop/]]></link>
			<title>Trump budget proposal would cut hundreds of millions more from CISA  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:14:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop/]]></link>
			<title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:14:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-phishing-platform-used-in-credential-theft-campaigns-against-c-suite-execs/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-phishing-platform-used-in-credential-theft-campaigns-against-c-suite-execs/]]></link>
			<title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs &#8211;</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 13:56:42 +0000]]></pubDate>
		</item>
				</channel>
</rss>
