<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html#new_tab</loc>
  <lastmod>2026-04-10T19:46:14Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>EXPMON Identified a Zero-Day Adobe Reader Exploit That Enables Local File Theft and Conditional Delivery of Follow-On Malicious Code</news:title>
   <news:publication_date>2026-04-10T19:46:14Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/#new_tab</loc>
  <lastmod>2026-04-10T19:44:29Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Storm-2755 Uses AiTM Session Hijacking and SEO Poisoning To Redirect Payroll Payments From Canadian Employees</news:title>
   <news:publication_date>2026-04-10T19:44:29Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide/#new_tab</loc>
  <lastmod>2026-04-10T19:41:47Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Mandiant Issues Defender&amp;#039;s Guide for Securing vSphere Against BRICKSTORM Malware</news:title>
   <news:publication_date>2026-04-10T19:41:47Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.fortinet.com/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2#new_tab</loc>
  <lastmod>2026-04-09T19:52:33Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 DPRK-Linked LNK Campaigns Use GitHub as Command and Control to Deliver Staged PowerShell Payloads and Maintain Covert Persistence on Windows Systems</news:title>
   <news:publication_date>2026-04-09T19:52:33Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/#new_tab</loc>
  <lastmod>2026-04-09T19:51:27Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Forest Blizzard Is Hijacking DNS Through Compromised SOHO Routers To Support Adversary-in-the-Middle Collection Against Downstream Targets</news:title>
   <news:publication_date>2026-04-09T19:51:27Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://unit42.paloaltonetworks.com/modern-kubernetes-threats/#new_tab</loc>
  <lastmod>2026-04-09T19:50:06Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Kubernetes-Focused Intrusions Are Increasing as Threat Actors Steal Service Account Tokens and Exploit Public-Facing Workloads to Pivot Into Cloud Environments</news:title>
   <news:publication_date>2026-04-09T19:50:06Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/#new_tab</loc>
  <lastmod>2026-04-08T19:47:40Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Microsoft Details High-Tempo Medusa Ransomware Operations by Storm-1175</news:title>
   <news:publication_date>2026-04-08T19:47:40Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.cyera.com/research/one-megabyte-to-root-how-a-size-check-broke-dockers-last-line-of-defense#new_tab</loc>
  <lastmod>2026-04-08T19:46:50Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Docker Engine CVE-2026-34040 Allows Authorization Plugin Bypass That Can Enable Unauthorized Privileged Container Creation Under Specific Conditions</news:title>
   <news:publication_date>2026-04-08T19:46:50Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a#new_tab</loc>
  <lastmod>2026-04-08T19:45:58Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Iranian APT Actors Exploit Internet-Facing PLCs Across U.S. Critical Infrastructure Causing Operational Disruptions</news:title>
   <news:publication_date>2026-04-08T19:45:58Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
