<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 2:49 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://attackfeed.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>AttackFeed by Joe Wagner</title>
		<link><![CDATA[https://attackfeed.com]]></link>
		<description><![CDATA[AttackFeed by Joe Wagner]]></description>
		<lastBuildDate><![CDATA[Fri, 03 Apr 2026 17:16:26 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://attackfeed.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://attackfeed.com/ai-future-the-leading-international-ai-and-web3-forum-to-take-place-in-april-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/ai-future-the-leading-international-ai-and-web3-forum-to-take-place-in-april-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>AI Future: The Leading International AI and Web3 Forum to Take Place in April  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:16:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ai-firm-mercor-confirms-breach-as-hackers-claim-4tb-of-stolen-data-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/ai-firm-mercor-confirms-breach-as-hackers-claim-4tb-of-stolen-data-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:16:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop-2/]]></guid>
			<link><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop-2/]]></link>
			<title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:14:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa-cyberscoop/]]></link>
			<title>Trump budget proposal would cut hundreds of millions more from CISA  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:14:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression-cyberscoop/]]></link>
			<title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:14:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-phishing-platform-used-in-credential-theft-campaigns-against-c-suite-execs/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-phishing-platform-used-in-credential-theft-campaigns-against-c-suite-execs/]]></link>
			<title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs &#8211;</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 13:56:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture-the-hacker-news/]]></link>
			<title>Why Third-Party Risk Is the Biggest Gap in Your Clients&#8217; Security Posture  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:43:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack-the-hacker-news/]]></link>
			<title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:43:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/nigerian-romance-scammer-jailed-after-being-caught-out-by-fellow-fraudster-graham-cluley/]]></guid>
			<link><![CDATA[https://attackfeed.com/nigerian-romance-scammer-jailed-after-being-caught-out-by-fellow-fraudster-graham-cluley/]]></link>
			<title>Nigerian romance scammer jailed after being caught out by fellow fraudster  &#8211; GRAHAM CLULEY</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:28:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials-the-hacker-news/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:29:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk-the-hacker-news/]]></link>
			<title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:26:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images-the-hacker-news/]]></link>
			<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:26:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cve-2026-33691-owasp-crs-whitespace-padding-bypassvulnerability-full-disclosure/]]></guid>
			<link><![CDATA[https://attackfeed.com/cve-2026-33691-owasp-crs-whitespace-padding-bypassvulnerability-full-disclosure/]]></link>
			<title>[CVE-2026-33691] OWASP CRS whitespace padding bypass	vulnerability  &#8211; Full Disclosure</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:56:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/kis-2026-06-metinfo-cms/]]></guid>
			<link><![CDATA[https://attackfeed.com/kis-2026-06-metinfo-cms/]]></link>
			<title>[KIS-2026-06] MetInfo CMS</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:56:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/apple-ohttp-relay-14-third-party-endpoints-6-countrieszero-user-visibility-full-disclosure/]]></guid>
			<link><![CDATA[https://attackfeed.com/apple-ohttp-relay-14-third-party-endpoints-6-countrieszero-user-visibility-full-disclosure/]]></link>
			<title>Apple OHTTP Relay: 14 Third-Party Endpoints, 6 Countries,	Zero User Visibility  &#8211; Full Disclosure</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:56:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/sec-consult-sa-20260326-0-local-privilege-escalation-in-vienna-assistant-macos-vienna-symphonic-library-full-disclosure/]]></guid>
			<link><![CDATA[https://attackfeed.com/sec-consult-sa-20260326-0-local-privilege-escalation-in-vienna-assistant-macos-vienna-symphonic-library-full-disclosure/]]></link>
			<title>SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) &#8211; Vienna Symphonic Library  &#8211; Full Disclosure</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:56:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/sec-consult-sa-20260401-0-broken-access-control-in-openwebui-full-disclosure/]]></guid>
			<link><![CDATA[https://attackfeed.com/sec-consult-sa-20260401-0-broken-access-control-in-openwebui-full-disclosure/]]></link>
			<title>SEC Consult SA-20260401-0 :: Broken Access Control in Open	WebUI  &#8211; Full Disclosure</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:56:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-cisco-products-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac/]]></guid>
			<link><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-cisco-products-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac/]]></link>
			<title>Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution  &#8211; Cyber Security Advisories &#8211; MS-ISAC</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:07:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-progress-sharefile-could-allow-for-remote-code-execution-cyber-security-advisories-ms-isac/]]></guid>
			<link><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-progress-sharefile-could-allow-for-remote-code-execution-cyber-security-advisories-ms-isac/]]></link>
			<title>Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution  &#8211; Cyber Security Advisories &#8211; MS-ISAC</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:07:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/shinyhunters-hackers-claim-theft-of-3m-cisco-records-threaten-public-leak-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/shinyhunters-hackers-claim-theft-of-3m-cisco-records-threaten-public-leak-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:29:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/house-dems-decry-confirmed-ice-usage-of-paragon-spyware-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/house-dems-decry-confirmed-ice-usage-of-paragon-spyware-cyberscoop/]]></link>
			<title>House Dems decry confirmed ICE usage of Paragon spyware  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:28:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/smashing-security-podcast-461-this-man-hid-400-million-in-a-fishing-rod-then-it-vanished-graham-cluley/]]></guid>
			<link><![CDATA[https://attackfeed.com/smashing-security-podcast-461-this-man-hid-400-million-in-a-fishing-rod-then-it-vanished-graham-cluley/]]></link>
			<title>Smashing Security podcast #461: This man hid $400 million in a fishing rod. Then it vanished  &#8211; GRAHAM CLULEY</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 23:56:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing-the-hacker-news/]]></link>
			<title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:21:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-apple-products-could-allow-for-privilege-escalation-cyber-security-advisories-ms-isac/]]></guid>
			<link><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-apple-products-could-allow-for-privilege-escalation-cyber-security-advisories-ms-isac/]]></link>
			<title>Multiple Vulnerabilities in Apple Products Could Allow for Privilege Escalation  &#8211; Cyber Security Advisories &#8211; MS-ISAC</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 22:15:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise-the-hacker-news/]]></link>
			<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:59:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/microsoft-warns-of-whatsapp-attachments-spreading-backdoor-on-windows-pcs-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/microsoft-warns-of-whatsapp-attachments-spreading-backdoor-on-windows-pcs-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Microsoft Warns of WhatsApp Attachments Spreading Backdoor on Windows PCs  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:59:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/akira-ransomware-group-can-achieve-initial-access-to-data-encryption-in-less-than-an-hour-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/akira-ransomware-group-can-achieve-initial-access-to-data-encryption-in-less-than-an-hour-cyberscoop/]]></link>
			<title>Akira ransomware group can achieve initial access to data encryption in less than an hour  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:58:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/medtech-giant-stryker-says-its-back-up-after-iranian-cyberattack-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/medtech-giant-stryker-says-its-back-up-after-iranian-cyberattack-cyberscoop/]]></link>
			<title>Medtech giant Stryker says it’s back up after Iranian cyberattack  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:53:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/new-storm-infostealer-remotely-decrypts-stolen-credentials/]]></guid>
			<link><![CDATA[https://attackfeed.com/new-storm-infostealer-remotely-decrypts-stolen-credentials/]]></link>
			<title>New &#8216;Storm&#8217; Infostealer Remotely Decrypts Stolen Credentials &#8211;</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:53:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories-the-hacker-news/]]></link>
			<title>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &amp; 10 More Stories  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:47:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/storm-infostealer-sold-as-service-targets-browsers-wallets-and-accounts-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/storm-infostealer-sold-as-service-targets-browsers-wallets-and-accounts-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:47:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/yurei-ransomware-uses-common-tools-adds-stranger-things-references-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/yurei-ransomware-uses-common-tools-adds-stranger-things-references-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Yurei Ransomware Uses Common Tools, Adds Stranger Things References  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:47:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/github-used-as-covert-channel-in-multi-stage-malware-campaign/]]></guid>
			<link><![CDATA[https://attackfeed.com/github-used-as-covert-channel-in-multi-stage-malware-campaign/]]></link>
			<title>GitHub Used as Covert Channel in Multi-Stage Malware Campaign &#8211;</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:46:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/researchers-observe-sub-one-hour-ransomware-attacks/]]></guid>
			<link><![CDATA[https://attackfeed.com/researchers-observe-sub-one-hour-ransomware-attacks/]]></link>
			<title>Researchers Observe Sub-One-Hour Ransomware Attacks &#8211;</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:46:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/apple-expands-ios-18-security-updates-amid-darksword-threat/]]></guid>
			<link><![CDATA[https://attackfeed.com/apple-expands-ios-18-security-updates-amid-darksword-threat/]]></link>
			<title>Apple Expands iOS 18 Security Updates Amid DarkSword Threat &#8211;</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:46:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/apple-pushes-rare-ios-18-patch-for-devices-at-risk-from-darksword-exploit-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/apple-pushes-rare-ios-18-patch-for-devices-at-risk-from-darksword-exploit-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Apple Pushes Rare iOS 18 Patch for Devices at Risk from DarkSword Exploit  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 22:48:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ncsc-issues-security-alert-over-hackers-targeting-whatsapp-and-signal-accounts/]]></guid>
			<link><![CDATA[https://attackfeed.com/ncsc-issues-security-alert-over-hackers-targeting-whatsapp-and-signal-accounts/]]></link>
			<title>NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts &#8211;</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:46:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/why-github-developers-are-targeted-by-token-giveaway-scams-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/why-github-developers-are-targeted-by-token-giveaway-scams-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Why GitHub Developers Are Targeted by Token Giveaway Scams  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:43:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/the-state-of-trusted-open-source-report-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/the-state-of-trusted-open-source-report-the-hacker-news/]]></link>
			<title>The State of Trusted Open Source Report  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:43:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners-the-hacker-news/]]></link>
			<title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:43:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action-the-hacker-news/]]></link>
			<title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:35:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/most-cni-firms-face-up-to-5m-in-downtime-from-ot-attacks/]]></guid>
			<link><![CDATA[https://attackfeed.com/most-cni-firms-face-up-to-5m-in-downtime-from-ot-attacks/]]></link>
			<title>Most CNI Firms Face Up to £5m in Downtime from OT Attacks &#8211;</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 09:27:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/apple-expands-ios-18-7-7-update-to-more-devices-to-block-darksword-exploit-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/apple-expands-ios-18-7-7-update-to-more-devices-to-block-darksword-exploit-the-hacker-news/]]></link>
			<title>Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 08:26:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/a-practical-guide-to-data-discovery-and-mapping-for-dpdp-compliance-jisa-softech-pvt-ltd/]]></guid>
			<link><![CDATA[https://attackfeed.com/a-practical-guide-to-data-discovery-and-mapping-for-dpdp-compliance-jisa-softech-pvt-ltd/]]></link>
			<title>A Practical Guide to Data Discovery and Mapping for DPDP Compliance &#8211; JISA Softech Pvt Ltd</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:20:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/google-introduces-android-dev-verification-amid-openness-debate/]]></guid>
			<link><![CDATA[https://attackfeed.com/google-introduces-android-dev-verification-amid-openness-debate/]]></link>
			<title>Google Introduces Android Dev Verification Amid Openness Debate &#8211;</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 02:58:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac/]]></guid>
			<link><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac/]]></link>
			<title>Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution  &#8211; Cyber Security Advisories &#8211; MS-ISAC</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 22:14:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/lawmakers-renew-push-for-labor-department-backed-cyber-apprenticeship-grants-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/lawmakers-renew-push-for-labor-department-backed-cyber-apprenticeship-grants-cyberscoop/]]></link>
			<title>Lawmakers renew push for Labor Department-backed cyber apprenticeship grants  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:59:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/linkedin-phishing-scam-uses-fake-notifications-to-hijack-accounts-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/linkedin-phishing-scam-uses-fake-notifications-to-hijack-accounts-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 19:43:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails-the-hacker-news/]]></link>
			<title>CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 18:37:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers-the-hacker-news/]]></link>
			<title>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:43:46 +0000]]></pubDate>
		</item>
				</channel>
</rss>
