<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.9-a.1'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//sra.io/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://thedfirreport.com/2026/05/11/flash-alert-etherrat-and-tuktuk-c2-end-in-the-gentleman-ransomware/#new_tab</loc>
  <lastmod>2026-05-14T19:42:49Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 EtherRAT and TukTuk Malware Intrusion Leads to The Gentlemen Ransomware Deployment</news:title>
   <news:publication_date>2026-05-14T19:42:49Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fany.run%2Fcybersecurity-blog%2Fagent-tesla-latam-enterprise%2F%23appendix-complete-ioc-reference-20852&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C7dd9ca7bf84545f4ac7e08deb1ea1d62%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639143816225737335%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=u9LA6xCrsfQmDMgQiLIHRrWvefkhHInFO6fW8pfUqzE%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-14T19:41:51Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Agent Tesla Campaign Targets LATAM Enterprises with Procurement-themed Phishing, Process Hollowing, and FTP Credential Exfiltration.</news:title>
   <news:publication_date>2026-05-14T19:41:51Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F05%2F14%2Fkazuar-anatomy-of-a-nation-state-botnet%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C1cbb53428de149127a6708deb1ea1c3c%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639143816221873301%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=eEIoxw6t%2F%2B%2BjWquTJqYhzyL38u3DRMpSVTKt1AUaa0o%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-14T19:41:01Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Russian State Actor Secret Blizzard Evolves Kazuar Malware into Modular Peer-to-Peer Espionage Botnet.</news:title>
   <news:publication_date>2026-05-14T19:41:01Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/the-ai-attribution-problem-nobody-in-security-is-talking-about-and-how-to-solve-it/</loc>
  <lastmod>2026-05-14T16:33:36Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>The AI Attribution Problem Nobody in Security Is Talking About, and How to Solve It</news:title>
   <news:publication_date>2026-05-14T15:16:07Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://sra.io/blog/the-ai-attribution-problem-now-with-queries-kql-for-defender-advanced-hunting/</loc>
  <lastmod>2026-05-14T16:43:26Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>The AI Attribution Problem, Now With Queries: KQL for Defender Advanced Hunting</news:title>
   <news:publication_date>2026-05-14T15:15:44Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fresearch.checkpoint.com%2F2026%2Fthus-spoke-the-gentlemen%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C721518e6504548ebe41008deb12102e4%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639142952532761461%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=P42Pwf%2Flud2b7ZV0uWyxOZh3TRC%2F2WBwwcouBicc2fA%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-13T19:18:55Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 The Gentlemen RaaS Leak Exposes Ransomware Group’s Affiliate Structure, Tooling, and Initial Access Methods</news:title>
   <news:publication_date>2026-05-13T19:18:55Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.instructure.com%2Fincident_update&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C4437c4395f674601d5c008deb12101ec%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639142952531494074%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=YrUnoY%2BmNuWBUOIZwo8%2BmyWifuvwYxXzaE98LIS6SVY%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-13T19:17:25Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Instructure Canvas Breach Exposes Education Data and Enables Targeted Extortion Against Schools</news:title>
   <news:publication_date>2026-05-13T19:17:25Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcloud.google.com%2Fblog%2Ftopics%2Fthreat-intelligence%2Fai-vulnerability-exploitation-initial-access%2F&amp;#038;data=05%7C02%7Ckimberly.kaleta%40sra.io%7C8d128489f5734c3833aa08deb12103e9%7C9bdee6ea21c54c1ca6c941dc3d08c310%7C0%7C0%7C639142952526311702%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;#038;sdata=RnZE1gWShT0yHgfmjOXUPZ3BF203zwYXBZ7TY9mR4lQ%3D&amp;#038;reserved=0#new_tab</loc>
  <lastmod>2026-05-13T19:15:35Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Security Risk Advisors</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>🚩 Google Reports Adversaries Are Expanding AI Use for Exploit Development, Malware Operations, and Initial Access</news:title>
   <news:publication_date>2026-05-13T19:15:35Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
