<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 10, 2026 at 4:10 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://attackfeed.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>AttackFeed by Joe Wagner</title>
		<link><![CDATA[https://attackfeed.com]]></link>
		<description><![CDATA[AttackFeed by Joe Wagner]]></description>
		<lastBuildDate><![CDATA[Thu, 09 Apr 2026 22:14:58 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://attackfeed.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://attackfeed.com/iranian-attacks-on-us-critical-infrastructure-puts-3900-devices-in-crosshairs-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/iranian-attacks-on-us-critical-infrastructure-puts-3900-devices-in-crosshairs-cyberscoop/]]></link>
			<title>Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 22:14:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/why-is-the-timeline-to-quantum-proof-everything-constantly-shrinking-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/why-is-the-timeline-to-quantum-proof-everything-constantly-shrinking-cyberscoop/]]></link>
			<title>Why is the timeline to quantum-proof everything constantly shrinking?  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 22:13:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets-the-hacker-news/]]></link>
			<title>EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 19:58:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/unc6783-hackers-use-fake-okta-pages-in-corporate-breach-campaign-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/unc6783-hackers-use-fake-okta-pages-in-corporate-breach-campaign-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/why-is-the-timeline-to-quantum-proof-everything-constantly-shrinking-cyberscoop-2/]]></guid>
			<link><![CDATA[https://attackfeed.com/why-is-the-timeline-to-quantum-proof-everything-constantly-shrinking-cyberscoop-2/]]></link>
			<title>Why is the timeline to quantum-proof everything constantly shrinking?  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 22:14:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns-the-hacker-news/]]></link>
			<title>UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides-the-hacker-news/]]></link>
			<title>GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:06:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/google-chrome-rolls-out-protection-against-infostealers-targeting-session-cookies/]]></guid>
			<link><![CDATA[https://attackfeed.com/google-chrome-rolls-out-protection-against-infostealers-targeting-session-cookies/]]></link>
			<title>Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies &#8211;</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:00:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/just-three-ransomware-gangs-accounted-for-40-of-attacks-last-month/]]></guid>
			<link><![CDATA[https://attackfeed.com/just-three-ransomware-gangs-accounted-for-40-of-attacks-last-month/]]></link>
			<title>Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month &#8211;</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:00:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure-the-hacker-news/]]></link>
			<title>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 11:59:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about-the-hacker-news/]]></link>
			<title>Browser Extensions Are the New AI Consumption Channel That No One Is Talking About  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 11:59:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/adobe-reader-zero-day-exploited-to-steal-data-via-malicious-pdfs-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/adobe-reader-zero-day-exploited-to-steal-data-via-malicious-pdfs-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 17:47:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows-the-hacker-news/]]></link>
			<title>Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:45:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers-the-hacker-news/]]></link>
			<title>Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 07:44:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/bitcoin-depot-reports-3-6m-crypto-theft-after-system-breach/]]></guid>
			<link><![CDATA[https://attackfeed.com/bitcoin-depot-reports-3-6m-crypto-theft-after-system-breach/]]></link>
			<title>Bitcoin Depot Reports $3.6m Crypto Theft After System Breach &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:45:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/stx-rat-targets-finance-sector-with-advanced-stealth-tactics/]]></guid>
			<link><![CDATA[https://attackfeed.com/stx-rat-targets-finance-sector-with-advanced-stealth-tactics/]]></link>
			<title>STX RAT Targets Finance Sector With Advanced Stealth Tactics &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:45:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/inside-the-fbis-router-takedown-that-cut-off-apt28s-tremendous-access-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/inside-the-fbis-router-takedown-that-cut-off-apt28s-tremendous-access-cyberscoop/]]></link>
			<title>Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 15:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy-the-hacker-news/]]></link>
			<title>New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:43:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/graphalgo-scam-lazarus-hackers-register-real-us-llcs-to-spread-malware-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/graphalgo-scam-lazarus-hackers-register-real-us-llcs-to-spread-malware-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>GraphAlgo Scam: Lazarus Hackers Register Real US LLCs to Spread Malware  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 18:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices-the-hacker-news/]]></link>
			<title>Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 17:43:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa-cyberscoop/]]></link>
			<title>Hack-for-hire spyware campaign targets journalists in Middle East, North Africa  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 17:43:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/node-js-trust-falls-dangerous-module-resolution-on-windows-zero-day-initiative-blog/]]></guid>
			<link><![CDATA[https://attackfeed.com/node-js-trust-falls-dangerous-module-resolution-on-windows-zero-day-initiative-blog/]]></link>
			<title>Node.js Trust Falls: Dangerous Module Resolution on Windows  &#8211; Zero Day Initiative &#8211; Blog</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:39:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-macos-malware-notnullosx-targets-crypto-wallets-over-10k-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-macos-malware-notnullosx-targets-crypto-wallets-over-10k-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>New macOS Malware notnullOSX Targets Crypto Wallets Over $10K  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:36:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:36:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/claude-code-can-be-manipulated-via-claude-md-to-run-sql-injection-attacks-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/claude-code-can-be-manipulated-via-claude-md-to-run-sql-injection-attacks-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:35:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region-the-hacker-news/]]></link>
			<title>Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:28:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/dont-just-fight-fraud-hunt-it-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/dont-just-fight-fraud-hunt-it-cyberscoop/]]></link>
			<title>Don’t just fight fraud, hunt it  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:28:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/middle-east-hack-for-hire-operation-traced-to-south-asian-cyber-espionage-group/]]></guid>
			<link><![CDATA[https://attackfeed.com/middle-east-hack-for-hire-operation-traced-to-south-asian-cyber-espionage-group/]]></link>
			<title>Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:27:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/operation-masquerade-fbi-disrupts-russian-router-hacking-campaign-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/operation-masquerade-fbi-disrupts-russian-router-hacking-campaign-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 17:43:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/atomic-stealer-macos-clickfix-attack-bypasses-apple-security-warnings/]]></guid>
			<link><![CDATA[https://attackfeed.com/atomic-stealer-macos-clickfix-attack-bypasses-apple-security-warnings/]]></link>
			<title>Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:27:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/governance-gaps-emerge-as-ai-agents-drive-76-increase-in-nhis/]]></guid>
			<link><![CDATA[https://attackfeed.com/governance-gaps-emerge-as-ai-agents-drive-76-increase-in-nhis/]]></link>
			<title>Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:22:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/]]></guid>
			<link><![CDATA[https://attackfeed.com/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/]]></link>
			<title>GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:13:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/google-warns-of-new-threat-group-targeting-bpos-and-helpdesks/]]></guid>
			<link><![CDATA[https://attackfeed.com/google-warns-of-new-threat-group-targeting-bpos-and-helpdesks/]]></link>
			<title>Google Warns of New Threat Group Targeting BPOs and Helpdesks &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:13:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/critical-vulnerability-in-ninja-forms-exposes-wordpress-sites/]]></guid>
			<link><![CDATA[https://attackfeed.com/critical-vulnerability-in-ninja-forms-exposes-wordpress-sites/]]></link>
			<title>Critical Vulnerability in Ninja Forms Exposes WordPress Sites &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:47:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/google-api-keys-quietly-gain-access-to-gemini-on-android-devices/]]></guid>
			<link><![CDATA[https://attackfeed.com/google-api-keys-quietly-gain-access-to-gemini-on-android-devices/]]></link>
			<title>Google API Keys Quietly Gain Access to Gemini on Android Devices &#8211;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:47:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/smashing-security-podcast-462-linkedin-is-spying-on-you-and-you-agreed-to-nothing-graham-cluley/]]></guid>
			<link><![CDATA[https://attackfeed.com/smashing-security-podcast-462-linkedin-is-spying-on-you-and-you-agreed-to-nothing-graham-cluley/]]></link>
			<title>Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing  &#8211; GRAHAM CLULEY</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 00:14:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies-the-hacker-news/]]></link>
			<title>APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 15:29:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories-the-hacker-news/]]></link>
			<title>ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:28:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/storm-1175-deploys-medusa-ransomware-within-24-hours-of-flaw-disclosure-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/storm-1175-deploys-medusa-ransomware-within-24-hours-of-flaw-disclosure-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Flaw Disclosure  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 15:29:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/russian-forest-blizzard-hackers-hijack-home-routers-for-global-spying-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/russian-forest-blizzard-hackers-hijack-home-routers-for-global-spying-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Russian Forest Blizzard Hackers Hijack Home Routers for Global Spying  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 13:21:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip-the-hacker-news/]]></link>
			<title>Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:13:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/anthropic-launches-project-glasswing-to-use-ai-to-find-and-fix-critical-software-vulnerabilities/]]></guid>
			<link><![CDATA[https://attackfeed.com/anthropic-launches-project-glasswing-to-use-ai-to-find-and-fix-critical-software-vulnerabilities/]]></link>
			<title>Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities &#8211;</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 11:56:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/claude-discovers-apache-activemq-bug-hidden-for-13-years/]]></guid>
			<link><![CDATA[https://attackfeed.com/claude-discovers-apache-activemq-bug-hidden-for-13-years/]]></link>
			<title>Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years &#8211;</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:43:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025-the-hacker-news/]]></link>
			<title>Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:28:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/us-thwarts-dns-hijacking-network-controlled-by-russian-apt28-hackers/]]></guid>
			<link><![CDATA[https://attackfeed.com/us-thwarts-dns-hijacking-network-controlled-by-russian-apt28-hackers/]]></link>
			<title>US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers &#8211;</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:43:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:10:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/the-hidden-security-risks-of-shadow-ai-in-enterprises-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/the-hidden-security-risks-of-shadow-ai-in-enterprises-the-hacker-news/]]></link>
			<title>The Hidden Security Risks of Shadow AI in Enterprises  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:28:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems-the-hacker-news/]]></link>
			<title>Anthropic&#8217;s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:10:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust-the-hacker-news/]]></link>
			<title>N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:58:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/commerce-setting-up-new-ai-export-regime-to-push-adoption-of-american-ai-abroad-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/commerce-setting-up-new-ai-export-regime-to-push-adoption-of-american-ai-abroad-cyberscoop/]]></link>
			<title>Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 19:45:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
