<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.9-a.3'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.levelblue.com%2Fblogs%2Fspiderlabs-blog%2Fyellowkey-and-greenplasma-two-new-windows-zero-days-unveiled&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C1ffee221092d4b49d14708deb69c70f3%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639148980183149298%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=FLIcl22QRvjO7V7MBo0Vu1S4zv4u5kzv4gS5DTSGg0M%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-20T19:24:41Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Microsoft Publishes Mitigation Guidance for YellowKey, a Publicly Disclosed BitLocker Bypass Tracked as CVE-2026-45585</news:title>
   <news:publication_date>2026-05-20T19:24:41Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F05%2F18%2Fstorm-2949-turned-compromised-identity-into-cloud-wide-breach%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Cf27d3935672c4d04ccc308deb69c6fce%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639148980173205086%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=uQgO8YjJto5dfBllQiNYCAcTzOHYxnKF0AsALdt%2FG0c%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-20T19:23:32Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Microsoft Details Storm-2949 Cloud Intrusion Leveraging SSPR Abuse, Azure RBAC, and Key Vault Compromise to Exfiltrate Data Across Microsoft 365 and Azure Environments</news:title>
   <news:publication_date>2026-05-20T19:23:32Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F05%2F19%2Fexposing-fox-tempest-a-malware-signing-service-operation%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Cb3dca4fb8b5d472473c608deb69c6ed4%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639148980158814134%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=CJJ%2Fb6o6SxCUpzPwhoM1IQllLX%2FDm9iUWT3mUojFjpY%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-20T19:21:59Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Microsoft Disrupts Fox Tempest, a Malware-Signing-as-a-Service Operation Abusing Microsoft Artifact Signing</news:title>
   <news:publication_date>2026-05-20T19:21:59Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/navigating-the-npm-attack-surface-defending-against-open-source-supply-chain-compromises/</loc>
  <lastmod>2026-05-20T14:27:55Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Navigating the npm Attack Surface: Defending Against Open-Source Supply Chain Compromises</news:title>
   <news:publication_date>2026-05-20T14:27:45Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblog.talosintelligence.com%2Ffrom-pdb-strings-to-maas-tracking-a-commodity-badiis-ecosystem-u%25E2%2580%25A6&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C8e9c8772207544b2896c08deb5d5a806%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639148126397680815%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=41uX%2BFiWEBeBiEJf5Rpua21h0Ed535u5OgM3%2B93i7Dw%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-19T19:48:51Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Chinese-speaking cybercrime groups use BadIIS malware-as-a-service ecosystem to hijack IIS servers for SEO fraud and traffic manipulation</news:title>
   <news:publication_date>2026-05-19T19:48:51Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.akamai.com%2Fblog%2Fsecurity-research%2Fcve-2026-42945-nginx-rift-heap-buffer-overflow-vulner%25E2%2580%25A6&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Ce25d003bd0d84dc4f91108deb5d5a68e%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639148126372225119%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=HHskWAcFzLqHSo7kzDN7%2BHTthfinP77YKHNxJxMMg9s%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-19T19:47:59Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Critical “NGINX Rift” vulnerability enables unauthenticated DoS and potential RCE through rewrite module misconfiguration</news:title>
   <news:publication_date>2026-05-19T19:47:59Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.humansecurity.com%2Flearn%2Fresource%2Fsatori-threat-intelligence-alert-trapdoor-funnels-malvertising-into-ad-fraud%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Cdcdbe36b484c42048b4808deb5d5a4eb%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639148126358371409%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=nZH%2FFII56WUd0uVviGqOXl%2BbSxRwpHFkd1c6wQWb3IU%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-19T19:46:09Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 HUMAN Security identifies Trapdoor, a self-sustaining Android ad fraud and malvertising operation spanning 455 malicious apps and 183 C2 domains</news:title>
   <news:publication_date>2026-05-19T19:46:09Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcloud.google.com%2Fblog%2Ftopics%2Fthreat-intelligence%2Fblackfile-vishing-extortion-operation&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Cfa7f3a5aec224470c2b408deb5136765%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639147292106424251%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=W%2B%2BJneGFgT26xRv6R%2FhfxwLdJdw4NizeUkMG2g9KSJQ%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-18T19:48:04Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 BlackFile extortion group uses vishing and AiTM techniques to compromise Microsoft 365 and Okta environments for large-scale SaaS data theft.</news:title>
   <news:publication_date>2026-05-18T19:48:04Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblog.packagist.com%2Fcomposer-2-9-8-and-2-2-28-fix-github-actions-token-disclosure-in-error-messages%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C6a24d23aea044cdf7c8908deb513641c%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639147292057275112%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=LtdqWnwBDcp3tLcohc%2FErbKDnW7OiMiMc%2Bo9UnSr%2Fzc%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-18T19:47:13Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Composer vulnerability leaks GitHub Actions tokens into CI logs through malformed token validation errors.</news:title>
   <news:publication_date>2026-05-18T19:47:13Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.esentire.com%2Fblog%2Ftycoon-2fa-operators-adopt-oauth-device-code-phishing&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C92ef0bd4e54342d2656508deb5136657%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639147292084015443%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=0e3UdGrsd8cIwXq9pl7yC9LIAZEx7LxS0fmH9wUuqIY%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-18T19:46:24Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Tycoon2FA phishing kit now abuses Microsoft device code authentication to hijack Microsoft 365 accounts.</news:title>
   <news:publication_date>2026-05-18T19:46:24Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/webinar-registration-mythos-ready-the-new-standard-for-cyber-programs-that-survive-ai-powered-attacks/</loc>
  <lastmod>2026-05-18T19:33:18Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Webinar Registration: Mythos-Ready: The New Standard for Cyber Programs That Survive AI-Powered Attacks</news:title>
   <news:publication_date>2026-05-18T19:33:08Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/webinar-mythos-ready-the-new-standard-for-cyber-programs-that-survive-ai-powered-attacks/</loc>
  <lastmod>2026-05-18T19:25:14Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Webinar: Mythos-Ready: The New Standard for Cyber Programs That Survive AI-Powered Attacks</news:title>
   <news:publication_date>2026-05-18T19:25:03Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
