<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 21, 2026 at 10:20 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://attackfeed.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>AttackFeed by Joe Wagner</title>
		<link><![CDATA[https://attackfeed.com]]></link>
		<description><![CDATA[AttackFeed by Joe Wagner]]></description>
		<lastBuildDate><![CDATA[Tue, 21 Apr 2026 14:14:53 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://attackfeed.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://attackfeed.com/crypto-exchange-grinex-blames-western-spies-for-13m-theft/]]></guid>
			<link><![CDATA[https://attackfeed.com/crypto-exchange-grinex-blames-western-spies-for-13m-theft/]]></link>
			<title>Crypto Exchange Grinex Blames Western Spies for $13m Theft &#8211;</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 14:14:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time-the-hacker-news/]]></link>
			<title>5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:57:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/unchecked-ai-agents-cause-cybersecurity-incidents-at-two-thirds-of-firms/]]></guid>
			<link><![CDATA[https://attackfeed.com/unchecked-ai-agents-cause-cybersecurity-incidents-at-two-thirds-of-firms/]]></link>
			<title>Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms &#8211;</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:42:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/grinex-crypto-exchange-shuts-down-blames-western-agencies-for-13-7m-breach-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/grinex-crypto-exchange-shuts-down-blames-western-agencies-for-13-7m-breach-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Grinex crypto exchange shuts down, blames Western agencies for $13.7M breach  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:55:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/threat-intel-scraping-without-burning-your-cover-or-your-stack-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/threat-intel-scraping-without-burning-your-cover-or-your-stack-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Threat Intel Scraping Without Burning Your Cover or Your Stack  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:55:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution-the-hacker-news/]]></link>
			<title>Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:43:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins-the-hacker-news/]]></link>
			<title>NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:43:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/no-exploit-needed-how-attackers-walk-through-the-front-door-via-identity-based-attacks-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/no-exploit-needed-how-attackers-walk-through-the-front-door-via-identity-based-attacks-the-hacker-news/]]></link>
			<title>No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:43:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-cross-domain-guidance-for-government-industry-and-the-wider-security-community-all-feed/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-cross-domain-guidance-for-government-industry-and-the-wider-security-community-all-feed/]]></link>
			<title>New cross domain guidance for government, industry and the wider security community  &#8211; All Feed</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:28:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/mythos-can-find-the-vulnerability-it-cant-tell-you-what-to-do-about-it-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/mythos-can-find-the-vulnerability-it-cant-tell-you-what-to-do-about-it-cyberscoop/]]></link>
			<title>Mythos can find the vulnerability. It can’t tell you what to do about it.  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:44:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/north-korean-blamed-for-290m-kelpdao-crypto-heist/]]></guid>
			<link><![CDATA[https://attackfeed.com/north-korean-blamed-for-290m-kelpdao-crypto-heist/]]></link>
			<title>North Korean Blamed for $290m KelpDAO Crypto Heist &#8211;</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:24:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/vercel-confirms-cyber-incident-after-sophisticated-attacker-exploits-third-party-tool/]]></guid>
			<link><![CDATA[https://attackfeed.com/vercel-confirms-cyber-incident-after-sophisticated-attacker-exploits-third-party-tool/]]></link>
			<title>Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool &#8211;</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:24:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cisa-adds-8-exploited-flaws-to-kev-sets-april-may-2026-federal-deadlines-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/cisa-adds-8-exploited-flaws-to-kev-sets-april-may-2026-federal-deadlines-the-hacker-news/]]></link>
			<title>CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 07:30:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/quantum-ready-banking-starts-with-cryptobind-hsm-vault-kms-strategy-jisa-softech-pvt-ltd/]]></guid>
			<link><![CDATA[https://attackfeed.com/quantum-ready-banking-starts-with-cryptobind-hsm-vault-kms-strategy-jisa-softech-pvt-ltd/]]></link>
			<title>Quantum-Ready Banking Starts with CryptoBind: HSM + Vault + KMS Strategy &#8211; JISA Softech Pvt Ltd</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 06:25:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/vercel-breach-linked-to-context-ai-shinyhunters-says-its-not-involved-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/vercel-breach-linked-to-context-ai-shinyhunters-says-its-not-involved-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Vercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 22:55:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/the-ftcs-ai-portfolio-is-about-to-get-bigger-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/the-ftcs-ai-portfolio-is-about-to-get-bigger-cyberscoop/]]></link>
			<title>The FTC’s AI portfolio is about to get bigger  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 22:06:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/vuln-in-googles-antigravity-ai-agent-manager-could-escape-sandbox-give-attackers-remote-code-execution-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/vuln-in-googles-antigravity-ai-agent-manager-could-escape-sandbox-give-attackers-remote-code-execution-cyberscoop/]]></link>
			<title>Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 22:06:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/vercels-security-breach-started-with-malware-disguised-as-roblox-cheats-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/vercels-security-breach-started-with-malware-disguised-as-roblox-cheats-cyberscoop/]]></link>
			<title>Vercel’s security breach started with malware disguised as Roblox cheats  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:59:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files-the-hacker-news/]]></link>
			<title>SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:40:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/how-to-remove-objects-from-video-ai-tools-pro-tips-2026-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/how-to-remove-objects-from-video-ai-tools-pro-tips-2026-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>How to Remove Objects from Video: AI Tools &amp; Pro Tips (2026)  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:24:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130000-users-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130000-users-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Fake TikTok Downloaders on Chrome and Edge Spying on 130,000 Users  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:24:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/zionsiphon-malware-targets-water-infrastructure-systems/]]></guid>
			<link><![CDATA[https://attackfeed.com/zionsiphon-malware-targets-water-infrastructure-systems/]]></link>
			<title>ZionSiphon Malware Targets Water Infrastructure Systems &#8211;</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:08:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/⚡-weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/⚡-weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more-the-hacker-news/]]></link>
			<title>⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge &amp; More  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:21:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/formbook-malware-campaign-uses-multiple-obfuscation-techniques-to-avoid-detection/]]></guid>
			<link><![CDATA[https://attackfeed.com/formbook-malware-campaign-uses-multiple-obfuscation-techniques-to-avoid-detection/]]></link>
			<title>Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection &#8211;</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:05:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/british-hacker-tyler-buchanan-pleads-guilty-to-8m-hacking-scheme-in-us-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/british-hacker-tyler-buchanan-pleads-guilty-to-8m-hacking-scheme-in-us-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>British Hacker Tyler Buchanan Pleads Guilty to $8M Hacking Scheme in US  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 14:16:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/why-the-axios-attack-proves-ai-is-mandatory-for-supply-chain-security-cyberscoop/]]></link>
			<title>Why the Axios attack proves AI is mandatory for supply chain security  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 14:15:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet-the-hacker-news/]]></link>
			<title>Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 07:12:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/attackers-exploit-dvr-command-injection-flaw-to-deploy-mirai-based-botnet/]]></guid>
			<link><![CDATA[https://attackfeed.com/attackers-exploit-dvr-command-injection-flaw-to-deploy-mirai-based-botnet/]]></link>
			<title>Attackers Exploit DVR Command Injection Flaw to Deploy  Mirai-Based Botnet &#8211;</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 13:59:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/why-most-ai-deployments-stall-after-the-demo-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/why-most-ai-deployments-stall-after-the-demo-the-hacker-news/]]></link>
			<title>Why Most AI Deployments Stall After the Demo  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 13:12:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac-2/]]></guid>
			<link><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac-2/]]></link>
			<title>Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution  &#8211; Cyber Security Advisories &#8211; MS-ISAC</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 02:55:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/network-background-noise-may-predict-the-next-big-edge-device-vulnerability-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/network-background-noise-may-predict-the-next-big-edge-device-vulnerability-cyberscoop/]]></link>
			<title>Network ‘background noise’ may predict the next big edge-device vulnerability  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:01:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain-the-hacker-news/]]></link>
			<title>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:01:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/52m-download-protobuf-js-library-hit-by-rce-in-schema-handling-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/52m-download-protobuf-js-library-hit-by-rce-in-schema-handling-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>52M-Download protobuf.js Library Hit by RCE in Schema Handling  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:01:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/showdoc-vulnerability-patched-in-2020-now-used-in-active-server-takeovers-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/showdoc-vulnerability-patched-in-2020-now-used-in-active-server-takeovers-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>ShowDoc Vulnerability Patched in 2020 Now Used in Active Server Takeovers  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 14:42:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/operation-poweroff-75k-users-of-ddos-for-hire-services-identified-and-warned-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/operation-poweroff-75k-users-of-ddos-for-hire-services-identified-and-warned-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Operation PowerOFF: 75K Users of DDoS-for-Hire Services Identified and Warned  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 12:36:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims-the-hacker-news/]]></link>
			<title>$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 09:16:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ncsc-outlines-coordinated-plan-to-boost-nhs-cyber-resilience/]]></guid>
			<link><![CDATA[https://attackfeed.com/ncsc-outlines-coordinated-plan-to-boost-nhs-cyber-resilience/]]></link>
			<title>NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience &#8211;</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 09:42:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems-the-hacker-news/]]></link>
			<title>Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 08:55:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/preparing-for-severe-cyber-threat-why-leaders-must-act-now-all-feed/]]></guid>
			<link><![CDATA[https://attackfeed.com/preparing-for-severe-cyber-threat-why-leaders-must-act-now-all-feed/]]></link>
			<title>Preparing for severe cyber threat: Why leaders must act now  &#8211; All Feed</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:28:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials-the-hacker-news/]]></link>
			<title>Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 04:43:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/founder-liquidity-without-compromising-on-growth-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/founder-liquidity-without-compromising-on-growth-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Founder Liquidity Without Compromising on Growth  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 21:43:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-recruitrat-saferrat-astrinox-massiv-android-malware-found-targeting-800-apps-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-recruitrat-saferrat-astrinox-massiv-android-malware-found-targeting-800-apps-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 20:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/the-race-to-quantum-proof-the-internet-has-already-begun-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/the-race-to-quantum-proof-the-internet-has-already-begun-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>The Race to Quantum-Proof the Internet Has Already Begun  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 18:34:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/the-surveillance-law-congress-cant-quit-and-cant-explain-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/the-surveillance-law-congress-cant-quit-and-cant-explain-cyberscoop/]]></link>
			<title>The surveillance law Congress can’t quit — and can’t explain  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 18:13:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/strengthening-cyber-resilience-across-the-nhs-with-collaboration-and-innovation-all-feed/]]></guid>
			<link><![CDATA[https://attackfeed.com/strengthening-cyber-resilience-across-the-nhs-with-collaboration-and-innovation-all-feed/]]></link>
			<title>Strengthening cyber resilience across the NHS with collaboration and innovation  &#8211; All Feed</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 16:08:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-mirai-variant-nexcorium-hijacks-dvr-devices-for-ddos-attacks-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-mirai-variant-nexcorium-hijacks-dvr-devices-for-ddos-attacks-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 15:20:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched-the-hacker-news/]]></link>
			<title>Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:13:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ddos-for-hire-services-disrupted-by-international-police-action-in-operation-poweroff/]]></guid>
			<link><![CDATA[https://attackfeed.com/ddos-for-hire-services-disrupted-by-international-police-action-in-operation-poweroff/]]></link>
			<title>DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’ &#8211;</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 13:57:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/commercial-ai-models-show-rapid-gains-in-vulnerability-research/]]></guid>
			<link><![CDATA[https://attackfeed.com/commercial-ai-models-show-rapid-gains-in-vulnerability-research/]]></link>
			<title>Commercial AI Models Show Rapid Gains in Vulnerability Research &#8211;</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 13:57:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-zionsiphon-malware-discovered-targeting-israeli-water-systems-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-zionsiphon-malware-discovered-targeting-israeli-water-systems-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>New ZionSiphon Malware Discovered Targeting Israeli Water Systems  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 13:12:19 +0000]]></pubDate>
		</item>
				</channel>
</rss>
