<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.8-a.5'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://research.checkpoint.com/2026/dfir-report-the-gentlemen/#new_tab</loc>
  <lastmod>2026-04-24T20:09:57Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 The Gentlemen Affiliate Used Domain-Level Access, Multi-Channel Lateral Movement, and Group Policy Deployment to Trigger Rapid Enterprise-Wide Ransomware Encryption</news:title>
   <news:publication_date>2026-04-24T20:09:57Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.rapid7.com/blog/post/tr-kyber-ransomware-double-trouble-windows-esxi-attacks-explained/#new_tab</loc>
  <lastmod>2026-04-24T20:09:06Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Kyber Ransomware Uses Coordinated Windows and ESXi Payloads To Maximize Operational Disruption Across Enterprise Environments</news:title>
   <news:publication_date>2026-04-24T20:09:06Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/#new_tab</loc>
  <lastmod>2026-04-24T20:08:17Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>AirSnitch Techniques Can Bypass WPA2/WPA3-Enterprise Protections To Intercept Traffic And Inject Packets In Enterprise Wi‑Fi Networks</news:title>
   <news:publication_date>2026-04-24T20:08:17Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.security.com/blog-post/harvester-new-linux-backdoor-gogra#new_tab</loc>
  <lastmod>2026-04-23T19:18:56Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Harvester APT Deploys New GoGra Linux Backdoor Using Microsoft Graph API for Covert C2</news:title>
   <news:publication_date>2026-04-23T19:18:56Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/#new_tab</loc>
  <lastmod>2026-04-23T19:18:03Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>North Korea-Linked IT Worker Schemes Abuse Hiring Workflows To Gain Trusted Access to Enterprise Environments</news:title>
   <news:publication_date>2026-04-23T19:18:03Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://socket.dev/blog/bitwarden-cli-compromised#new_tab</loc>
  <lastmod>2026-04-23T19:16:53Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Bitwarden CLI npm Package Was Compromised in the Ongoing Checkmarx Supply Chain Campaign Through a Malicious CI/CD Workflow</news:title>
   <news:publication_date>2026-04-23T19:16:53Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/the-virtualized-threat-malicious-actors-exploiting-native-hyper-v-virtualization-features-to-conduct-covert-operations/</loc>
  <lastmod>2026-04-23T13:11:36Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>The Virtualized Threat: Malicious actors exploiting native Hyper-V virtualization features to conduct covert operations</news:title>
   <news:publication_date>2026-04-23T13:11:26Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>