<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7-a.5'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://www.gstatic.com/security-marketing/m-trends-2026-en.pdf#new_tab</loc>
  <lastmod>2026-03-24T19:55:20Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Mandiant M-Trends 2026 Finds Exploits Still Lead Intrusions as Vishing, Fast Access Hand-Offs, and Recovery Denial Reshape Threat Operations</news:title>
   <news:publication_date>2026-03-24T19:55:20Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://blog.talosintelligence.com/everyday-tools-extraordinary-crimes-the-ransomware-exfiltration-playbook/#new_tab</loc>
  <lastmod>2026-03-24T19:54:19Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Cisco Talos Introduces Exfiltration Framework to Combat Ransomware Abuse of Legitimate Tools</news:title>
   <news:publication_date>2026-03-24T19:54:19Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.microsoft.com/en-us/security/blog/2026/03/19/when-tax-season-becomes-cyberattack-season-phishing-and-malware-campaigns-using-tax-related-lures/#new_tab</loc>
  <lastmod>2026-03-24T19:53:28Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Microsoft Details Surge in Tax-Themed Phishing Campaigns Delivering AiTM Kits and RMM Trojans</news:title>
   <news:publication_date>2026-03-24T19:53:28Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.trendmicro.com/en_us/research/26/c/copyright-lures-mask-a-multistage-purelog-stealer-attack.html#new_tab</loc>
  <lastmod>2026-03-23T18:58:40Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 TrendAI Discovers Multi-Stage PureLog Stealer Campaign Disguised as Copyright Violation Notices Targeting Key Industries</news:title>
   <news:publication_date>2026-03-23T18:58:40Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.ic3.gov/CSA/2026/260320.pdf#new_tab</loc>
  <lastmod>2026-03-23T18:57:44Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 FBI Warns of Iranian MOIS Cyber Actors Utilizing Telegram C2 to Target Dissidents</news:title>
   <news:publication_date>2026-03-23T18:57:44Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://www.threatfabric.com/blogs/perseus-dto-malware-that-takes-notes#new_tab</loc>
  <lastmod>2026-03-23T18:56:38Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Perseus Android Malware Targets Note-Taking Apps to Harvest Passwords and Crypto Keys</news:title>
   <news:publication_date>2026-03-23T18:56:38Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/excytin-bench-part-4-ai-in-your-soc-process-beats-technology/</loc>
  <lastmod>2026-03-24T15:35:12Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>ExCyTIn-Bench Part 4: AI In Your SOC: Process Beats Technology</news:title>
   <news:publication_date>2026-03-23T13:20:22Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
