<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.8'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F05%2F04%2Fbreaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-token-compromise%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C8d25340f1c60425cdeae08deaba2533f%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639136910840007740%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=NyRBwng6nfnrWCVOd9h9epDTGhU38bWpzHGfAIl190Y%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-06T19:52:32Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Microsoft Warns Code of Conduct Phishing Campaign Leads to AiTM Token Compromise</news:title>
   <news:publication_date>2026-05-06T19:52:32Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurelist.com%2Ftr%2Fdaemon-tools-backdoor%2F119654%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Ce684b559c8cd45e8b01708deaba25178%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639136910806746271%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=Yc%2Fn72LBGq5YgG4KgFV9Ib2lf%2FezHLr597%2BXDOxaCS0%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-06T19:51:19Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 DAEMON Tools Supply Chain Attack Deploys Targeted Backdoors Since April 8, 2026</news:title>
   <news:publication_date>2026-05-06T19:51:19Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity.paloaltonetworks.com%2FCVE-2026-0300&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C46146e3691774d33f12908deaba24f2e%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639136910792302851%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=U%2ByfnggoG5k2964ZYa49wpo2tH2qIraqMYV4mH4E7QA%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-06T19:50:27Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Actively Exploited Zero-Day Buffer Overflow in Palo Alto PAN-OS Grants Remote Code Execution as Root on Internet-Facing Firewalls</news:title>
   <news:publication_date>2026-05-06T19:50:27Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsecuronix.com%2Fblog%2Fvenomous-helper-phishing-campaign&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7Cd452ee6ccb664ae2c8b808deaad6d1a0%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639136036762916577%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=99C12i29%2Bc4erbTM9pQRFY4YUACGi6ZNNSQoNVxCBTc%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-05T19:06:11Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Phishing Campaign Uses Signed RMM Tools to Establish Silent Persistent Remote Access</news:title>
   <news:publication_date>2026-05-05T19:06:11Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fclickfix-castleloader-backgroundfix%23background&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C2e44cd8391e641ccb97808deaad6d06c%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639136036752775987%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=V%2B1DyEy%2BY%2FvfPGbFyQJ1Pl3j0XuSG1s67DoCKZpUGtk%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-05T19:05:17Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 ClickFix Campaign Uses Fake Background Removal Sites to Deliver CastleLoader, NetSupport RAT, and Credential Stealer</news:title>
   <news:publication_date>2026-05-05T19:05:17Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.splunk.com%2Fen_us%2Fblog%2Fsecurity%2Fdetecting-ghost-rat-cloverplus-adware-loader-analysis.html&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C28ddfc45c3714b7b072908deaad6cf6f%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639136036733383247%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=Zh1RBoo%2F1%2F65d5lIVgPeuDbkKhrvHRHsZiGMN4jjkSc%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-05T19:08:00Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Adware Bundle Delivers Gh0st RAT for Persistent Remote Access and Credential Theft</news:title>
   <news:publication_date>2026-05-05T19:04:03Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>