<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.9-a.1'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://sra.io/wp-content/uploads/2026/05/TB20260512-May-2026-Microsoft-Patch-Tuesday.pdf#new_tab</loc>
  <lastmod>2026-05-12T20:11:34Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>TB20260512 – Microsoft Patch Tuesday</news:title>
   <news:publication_date>2026-05-12T20:10:53Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/prepping-for-ai-velocity-do-the-common-things-uncommonly-well/</loc>
  <lastmod>2026-05-12T19:44:27Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Prepping for AI Velocity: Do the Common Things Uncommonly Well</news:title>
   <news:publication_date>2026-05-12T19:44:19Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.malwarebytes.com%2Fblog%2Fthreat-intel%2F2026%2F05%2Fattackers-adopt-javascript-runtime-bun-to-spread-nwhstealer&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C6fdab558be26412bf47a08deb03ede7d%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639141981248631682%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=qv3qIEXoRSQk05WfBDwE5gdL44DQkwCL2CCLqzghwfs%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-12T17:33:19Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Attackers Use Bun JavaScript Runtime to Deliver NWHStealer and Evade Detection</news:title>
   <news:publication_date>2026-05-12T17:33:19Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblog.talosintelligence.com%2Fcloudz-pheno-infostealer%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Cfcbcac0c5b6044f28ea108deb03edf90%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639141981247772435%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=%2F3Isb%2FRJ0m5R%2BmU6nrIvwpJQWq9D%2FDd4KMCUrtf%2FRqE%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-12T17:32:30Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 CloudZ RAT Abuses Microsoft Phone Link to Potentially Steal OTPs and SMS Data</news:title>
   <news:publication_date>2026-05-12T17:32:30Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Funit42.paloaltonetworks.com%2Fcaptive-portal-zero-day%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Ce46bfff9ff3745f04fe908deb03eda5c%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639141981156647760%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=%2BPFgc67RbK7%2Bw0bi%2B8LRLovc6AF7BUKQskyo9Cy%2Ba1M%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-12T17:31:19Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Palo Alto Networks PAN-OS Vulnerability Exploited for Unauthenticated Remote Code Execution on Firewalls</news:title>
   <news:publication_date>2026-05-12T17:31:19Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fjdownloader.org%2Fincident_8.5.2026.html%3Fv%3D20260508277000&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C8b252edd176a4fa39f3a08deaf922235%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639141239357841454%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=JfzDN8TO%2B2hk8mstvZ9KQlUiM%2BwrHXrHRyjIvoYRx6I%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-11T20:42:44Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 JDownloader Website Compromised, Distributing Python RAT via Malicious Installers</news:title>
   <news:publication_date>2026-05-11T20:42:44Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cyera.com%2Fresearch%2Fbleeding-llama-critical-unauthenticated-memory-leak-in-ollama&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C32823c3cf26f4577010408deaf92211e%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639141239302379559%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=UMKtxwX0pBUdkjnvOOHytjaUBgQLVeu0EiMkE%2FjjrX4%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-11T20:41:36Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Out-of-Bounds Read Vulnerability in Ollama Allows Remote Process Memory Leak</news:title>
   <news:publication_date>2026-05-11T20:41:36Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblog.talosintelligence.com%2Fuat-8302%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C3a1b9dc90289470c324708deaf922016%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639141239296068085%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=Lmj3JYb6CuelxAQjBXPIu6yq2RmUxEAUoc2qAM7HX0w%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-11T20:40:46Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 China-Nexus APT UAT-8302 Deploys Multi-Malware Arsenal Against Government Networks</news:title>
   <news:publication_date>2026-05-11T20:40:46Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
