<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 16, 2026 at 10:16 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://attackfeed.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>AttackFeed by Joe Wagner</title>
		<link><![CDATA[https://attackfeed.com]]></link>
		<description><![CDATA[AttackFeed by Joe Wagner]]></description>
		<lastBuildDate><![CDATA[Thu, 16 Apr 2026 18:28:28 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://attackfeed.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://attackfeed.com/officials-seize-53-ddos-for-hire-domains-in-ongoing-crackdown-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/officials-seize-53-ddos-for-hire-domains-in-ongoing-crackdown-cyberscoop/]]></link>
			<title>Officials seize 53 DDoS-for-hire domains in ongoing crackdown  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 18:28:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/openai-launches-gpt-5-4-cyber-to-boost-defensive-cybersecurity-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/openai-launches-gpt-5-4-cyber-to-boost-defensive-cybersecurity-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 16:56:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/apk-malformation-found-in-thousands-of-android-malware-samples/]]></guid>
			<link><![CDATA[https://attackfeed.com/apk-malformation-found-in-thousands-of-android-malware-samples/]]></link>
			<title>APK Malformation Found in Thousands of Android Malware Samples &#8211;</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 16:23:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/us-nationals-jailed-for-operating-fake-remote-worker-laptop-farms-for-north-korea/]]></guid>
			<link><![CDATA[https://attackfeed.com/us-nationals-jailed-for-operating-fake-remote-worker-laptop-farms-for-north-korea/]]></link>
			<title>US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea &#8211;</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 16:23:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cookeville-medical-center-notifies-patients-after-july-2025-ransomware-attack/]]></guid>
			<link><![CDATA[https://attackfeed.com/cookeville-medical-center-notifies-patients-after-july-2025-ransomware-attack/]]></link>
			<title>Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack &#8211;</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 15:12:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories-the-hacker-news/]]></link>
			<title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 14:43:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment-the-hacker-news/]]></link>
			<title>[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:36:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/nist-drops-nvd-enrichment-for-pre-march-2026-vulnerabilities/]]></guid>
			<link><![CDATA[https://attackfeed.com/nist-drops-nvd-enrichment-for-pre-march-2026-vulnerabilities/]]></link>
			<title>NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities &#8211;</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:03:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu-the-hacker-news/]]></link>
			<title>Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:32:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/researchers-say-fiverr-left-user-files-open-to-google-search-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/researchers-say-fiverr-left-user-files-open-to-google-search-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Researchers Say Fiverr Left User Files Open to Google Search  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:32:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks-the-hacker-news/]]></link>
			<title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:31:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cybersecurity-risks-of-hiring-a-virtual-assistant-and-how-to-protect-your-business-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/cybersecurity-risks-of-hiring-a-virtual-assistant-and-how-to-protect-your-business-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Cybersecurity Risks of Hiring a Virtual Assistant and How to Protect Your Business  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:31:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution-the-hacker-news/]]></link>
			<title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:31:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/systemic-flaw-in-mcp-protocol-could-expose-150-million-downloads/]]></guid>
			<link><![CDATA[https://attackfeed.com/systemic-flaw-in-mcp-protocol-could-expose-150-million-downloads/]]></link>
			<title>Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads &#8211;</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:58:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ghost-breaches-how-ai-mediated-narratives-have-become-a-new-threat-vector-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/ghost-breaches-how-ai-mediated-narratives-have-become-a-new-threat-vector-cyberscoop/]]></link>
			<title>Ghost breaches: How AI-mediated narratives have become a new threat vector  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 10:55:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/automotive-ransomware-attacks-double-in-a-year/]]></guid>
			<link><![CDATA[https://attackfeed.com/automotive-ransomware-attacks-double-in-a-year/]]></link>
			<title>Automotive Ransomware Attacks Double in a Year &#8211;</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 09:49:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/triad-nexus-expands-global-fraud-operations-despite-us-sanctions/]]></guid>
			<link><![CDATA[https://attackfeed.com/triad-nexus-expands-global-fraud-operations-despite-us-sanctions/]]></link>
			<title>Triad Nexus Expands Global Fraud Operations Despite US Sanctions &#8211;</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 09:42:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign-the-hacker-news/]]></link>
			<title>UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 07:06:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/securing-remote-server-access-why-vpns-matter-for-administrators-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/securing-remote-server-access-why-vpns-matter-for-administrators-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Securing Remote Server Access: Why VPNs Matter for Administrators  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 01:44:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/fake-claude-ai-installer-targets-windows-users-with-plugx-malware-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/fake-claude-ai-installer-targets-windows-users-with-plugx-malware-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Fake Claude AI Installer Targets Windows Users with PlugX Malware  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 22:42:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/anonymizing-network-traffic-a-dive-into-socks5-and-data-encryption-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/anonymizing-network-traffic-a-dive-into-socks5-and-data-encryption-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Anonymizing Network Traffic: A Dive into SOCKS5 and Data Encryption  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 01:43:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/smashing-security-podcast-463-this-ai-company-leaked-its-own-code-its-also-built-something-terrifying-graham-cluley/]]></guid>
			<link><![CDATA[https://attackfeed.com/smashing-security-podcast-463-this-ai-company-leaked-its-own-code-its-also-built-something-terrifying-graham-cluley/]]></link>
			<title>Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying  &#8211; GRAHAM CLULEY</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:04:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/nist-narrows-scope-of-cve-analysis-to-keep-up-with-rising-tide-of-vulnerabilities-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/nist-narrows-scope-of-cve-analysis-to-keep-up-with-rising-tide-of-vulnerabilities-cyberscoop/]]></link>
			<title>NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 21:08:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/fake-ledger-live-app-on-apple-store-linked-to-9-5m-crypto-theft-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/fake-ledger-live-app-on-apple-store-linked-to-9-5m-crypto-theft-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Fake Ledger Live App on Apple Store Linked to $9.5M Crypto Theft  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 19:32:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/executive-orders-likely-ahead-in-next-steps-for-national-cyber-strategy-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/executive-orders-likely-ahead-in-next-steps-for-national-cyber-strategy-cyberscoop/]]></link>
			<title>Executive orders likely ahead in next steps for national cyber strategy  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 19:00:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails-the-hacker-news/]]></link>
			<title>n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 18:28:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/openai-unveils-gpt-5-4-cyber-for-improving-cyber-defense-with-ai/]]></guid>
			<link><![CDATA[https://attackfeed.com/openai-unveils-gpt-5-4-cyber-for-improving-cyber-defense-with-ai/]]></link>
			<title>OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 16:58:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/malicious-chrome-extensions-campaign-exposes-user-data/]]></guid>
			<link><![CDATA[https://attackfeed.com/malicious-chrome-extensions-campaign-exposes-user-data/]]></link>
			<title>Malicious Chrome Extensions Campaign Exposes User Data &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 16:51:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/signed-adware-operation-disables-antivirus-across-23000-hosts/]]></guid>
			<link><![CDATA[https://attackfeed.com/signed-adware-operation-disables-antivirus-across-23000-hosts/]]></link>
			<title>Signed Adware Operation Disables Antivirus Across 23,000 Hosts &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 15:57:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/european-cybersecurity-agency-enisa-seeks-top-tier-status-in-cve-program/]]></guid>
			<link><![CDATA[https://attackfeed.com/european-cybersecurity-agency-enisa-seeks-top-tier-status-in-cve-program/]]></link>
			<title>European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 15:57:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/openai-expands-trusted-access-for-cyber-program-with-new-gpt-5-4-cyber-model-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/openai-expands-trusted-access-for-cyber-program-with-new-gpt-5-4-cyber-model-cyberscoop/]]></link>
			<title>OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model   &#8211; CyberScoop</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:57:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/critical-nginx-ui-mcp-flaw-actively-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://attackfeed.com/critical-nginx-ui-mcp-flaw-actively-exploited-in-the-wild/]]></link>
			<title>Critical Nginx-ui MCP Flaw Actively Exploited in the Wild &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/shinyhunters-leak-rockstar-games-data-no-player-records-impacted-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/shinyhunters-leak-rockstar-games-data-no-player-records-impacted-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>ShinyHunters Leak Rockstar Games Data, No Player Records Impacted  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:09:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more-the-hacker-news/]]></link>
			<title>April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:09:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover-the-hacker-news/]]></link>
			<title>Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:09:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/deterministic-agentic-ai-the-architecture-exposure-validation-requires-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/deterministic-agentic-ai-the-architecture-exposure-validation-requires-the-hacker-news/]]></link>
			<title>Deterministic + Agentic AI: The Architecture Exposure Validation Requires  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 13:05:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/retaining-defensive-advantage-in-the-age-of-frontier-ai-cyber-capabilities-all-feed/]]></guid>
			<link><![CDATA[https://attackfeed.com/retaining-defensive-advantage-in-the-age-of-frontier-ai-cyber-capabilities-all-feed/]]></link>
			<title>Retaining defensive advantage in the age of frontier AI cyber capabilities   &#8211; All Feed</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:27:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/108-malicious-chrome-extensions-caught-stealing-google-and-telegram-data-from-20000-users-graham-cluley/]]></guid>
			<link><![CDATA[https://attackfeed.com/108-malicious-chrome-extensions-caught-stealing-google-and-telegram-data-from-20000-users-graham-cluley/]]></link>
			<title>108 malicious Chrome extensions caught stealing Google and Telegram data from 20,000 users  &#8211; GRAHAM CLULEY</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 11:26:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/active-hanghost-loader-campaign-targets-enterprise-payment-and-logistics-workflows-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/active-hanghost-loader-campaign-targets-enterprise-payment-and-logistics-workflows-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>Active HanGhost Loader Campaign Targets Enterprise Payment and Logistics Workflows  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:53:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/13-5m-device-botnet-drives-2-tbps-ddos-attacks-on-fintech-qrator-finds-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></guid>
			<link><![CDATA[https://attackfeed.com/13-5m-device-botnet-drives-2-tbps-ddos-attacks-on-fintech-qrator-finds-hackread-cybersecurity-news-data-breaches-ai-and-more/]]></link>
			<title>13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds  &#8211; Hackread – Cybersecurity News, Data Breaches, AI and More</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:53:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/were-only-seeing-the-tip-of-the-chip-smuggling-iceberg-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/were-only-seeing-the-tip-of-the-chip-smuggling-iceberg-cyberscoop/]]></link>
			<title>We’re only seeing the tip of the chip-smuggling iceberg  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:36:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/researchers-spot-surge-in-brute-force-attacks-from-middle-east/]]></guid>
			<link><![CDATA[https://attackfeed.com/researchers-spot-surge-in-brute-force-attacks-from-middle-east/]]></link>
			<title>Researchers Spot Surge in Brute-Force Attacks from Middle East &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:36:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/ai-companies-to-play-bigger-role-in-cve-program-says-cisa/]]></guid>
			<link><![CDATA[https://attackfeed.com/ai-companies-to-play-bigger-role-in-cve-program-says-cisa/]]></link>
			<title>AI Companies To Play Bigger Role in CVE Program, Says CISA &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:36:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities-the-hacker-news/]]></link>
			<title>Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:43:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic-the-hacker-news/]]></link>
			<title>Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 19:08:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/microsoft-fixes-two-zero-days-in-april-patch-tuesday/]]></guid>
			<link><![CDATA[https://attackfeed.com/microsoft-fixes-two-zero-days-in-april-patch-tuesday/]]></link>
			<title>Microsoft Fixes Two Zero-Days in April Patch Tuesday &#8211;</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:29:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/pci-dss-4-0-roadmap-for-dpos-using-vault-jisa-softech-pvt-ltd/]]></guid>
			<link><![CDATA[https://attackfeed.com/pci-dss-4-0-roadmap-for-dpos-using-vault-jisa-softech-pvt-ltd/]]></link>
			<title>PCI DSS 4.0 roadmap for DPOs using vault &#8211; JISA Softech Pvt Ltd</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams-the-hacker-news/]]></guid>
			<link><![CDATA[https://attackfeed.com/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams-the-hacker-news/]]></link>
			<title>OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams  &#8211; The Hacker News</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 06:27:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-adobe-products-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac-3/]]></guid>
			<link><![CDATA[https://attackfeed.com/multiple-vulnerabilities-in-adobe-products-could-allow-for-arbitrary-code-execution-cyber-security-advisories-ms-isac-3/]]></link>
			<title>Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution  &#8211; Cyber Security Advisories &#8211; MS-ISAC</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 00:24:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://attackfeed.com/us-nationals-sentenced-for-aiding-north-koreas-tech-worker-scheme-cyberscoop/]]></guid>
			<link><![CDATA[https://attackfeed.com/us-nationals-sentenced-for-aiding-north-koreas-tech-worker-scheme-cyberscoop/]]></link>
			<title>US nationals sentenced for aiding North Korea’s tech worker scheme  &#8211; CyberScoop</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 00:01:50 +0000]]></pubDate>
		</item>
				</channel>
</rss>
