<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.8-a.5'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://www.security.com/blog-post/harvester-new-linux-backdoor-gogra#new_tab</loc>
  <lastmod>2026-04-23T19:18:56Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Harvester APT Deploys New GoGra Linux Backdoor Using Microsoft Graph API for Covert C2</news:title>
   <news:publication_date>2026-04-23T19:18:56Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/#new_tab</loc>
  <lastmod>2026-04-23T19:18:03Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>North Korea-Linked IT Worker Schemes Abuse Hiring Workflows To Gain Trusted Access to Enterprise Environments</news:title>
   <news:publication_date>2026-04-23T19:18:03Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://socket.dev/blog/bitwarden-cli-compromised#new_tab</loc>
  <lastmod>2026-04-23T19:16:53Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Bitwarden CLI npm Package Was Compromised in the Ongoing Checkmarx Supply Chain Campaign Through a Malicious CI/CD Workflow</news:title>
   <news:publication_date>2026-04-23T19:16:53Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/the-virtualized-threat-malicious-actors-exploiting-native-hyper-v-virtualization-features-to-conduct-covert-operations/</loc>
  <lastmod>2026-04-23T13:11:36Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>The Virtualized Threat: Malicious actors exploiting native Hyper-V virtualization features to conduct covert operations</news:title>
   <news:publication_date>2026-04-23T13:11:26Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.huntress.com/blog/nightmare-eclipse-intrusion#new_tab</loc>
  <lastmod>2026-04-22T19:48:46Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Nightmare-Eclipse Tooling Moves from PoC to Real-World Intrusions via VPN Access and Privilege Escalation</news:title>
   <news:publication_date>2026-04-22T19:48:46Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.trendmicro.com/en_us/research/26/d/void-dokkaebi-uses-fake-job-interview-lure-to-spread-malware-via-code-repositories.html#new_tab</loc>
  <lastmod>2026-04-22T19:47:44Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Void Dokkaebi Turns Developer Repositories into Self-Propagating Malware Supply Chain</news:title>
   <news:publication_date>2026-04-22T19:47:44Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/#iocs-and-ttps-20176#new_tab</loc>
  <lastmod>2026-04-22T19:46:41Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Lazarus “Mach-O Man” Campaign Targets macOS via Fake Meetings and User-Executed Malware</news:title>
   <news:publication_date>2026-04-22T19:46:41Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>