<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.8-a.3'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://www.elastic.co/security-labs/phantom-in-the-vault#new_tab</loc>
  <lastmod>2026-04-16T20:09:48Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 “Phantom in the Vault” Attack Targets Secrets in Memory to Bypass Traditional Security Controls</news:title>
   <news:publication_date>2026-04-16T20:09:48Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://securelist.com/janelarat-financial-threat-in-latin-america/119332/#new_tab</loc>
  <lastmod>2026-04-16T20:08:59Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Janelar RAT Targets Financial Institutions with Stealthy Remote Access and Credential Theft</news:title>
   <news:publication_date>2026-04-16T20:08:59Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.wiz.io/blog/github-actions-security-guide#new_tab</loc>
  <lastmod>2026-04-16T20:08:00Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>GitHub Actions Misconfigurations Expose CI/CD Pipelines to Secret Theft and Code Injection</news:title>
   <news:publication_date>2026-04-16T20:08:00Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/form-submitted-scalr-xdr-forrester-tei-report/</loc>
  <lastmod>2026-04-16T16:14:13Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Form Submitted - SCALR XDR Forrester TEI Report</news:title>
   <news:publication_date>2026-04-16T16:13:15Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/vectr-fundamentals-why-execute-test-cases/</loc>
  <lastmod>2026-04-16T20:44:51Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>VECTR Fundamentals: Why Execute Test Cases?</news:title>
   <news:publication_date>2026-04-16T15:25:19Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://blog.talosintelligence.com/new-lua-based-malware-lucidrook/#new_tab</loc>
  <lastmod>2026-04-15T20:15:54Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 LucidRook Malware Uses Lua-Based Backdoor for Stealthy Cross-Platform Access</news:title>
   <news:publication_date>2026-04-15T20:15:54Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://blog.talosintelligence.com/the-n8n-n8mare/#new_tab</loc>
  <lastmod>2026-04-15T20:14:45Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Threat Actors Abuse n8n AI Workflow Automation Platform for Malware Delivery and Device Fingerprinting</news:title>
   <news:publication_date>2026-04-15T20:14:45Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://blog.packagist.com/composer-2-9-6-perforce-driver-command-injection-vulnerabilities/#new_tab</loc>
  <lastmod>2026-04-15T20:13:29Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Composer Command Injection Vulnerabilities in Perforce VCS Driver Enable Arbitrary Command Execution</news:title>
   <news:publication_date>2026-04-15T20:13:29Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
