<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://www.hackwire.news/news/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:57.000Z</news:publication_date>
      <news:title>Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:30:06.000Z</news:publication_date>
      <news:title>RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/webinar-today-why-automated-pentesting-alone-is-not-enough</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:29:21.000Z</news:publication_date>
      <news:title>Webinar Today: Why Automated Pentesting Alone Is Not Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:28:34.000Z</news:publication_date>
      <news:title>GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/focusing-on-the-people-in-cybersecurity-at-rsac-2026-conference</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:27:47.000Z</news:publication_date>
      <news:title>Focusing on the People in Cybersecurity at RSAC 2026 Conference</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:08:01.000Z</news:publication_date>
      <news:title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/why-your-automated-pentesting-tool-just-hit-a-wall</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:08:01.000Z</news:publication_date>
      <news:title>Why Your Automated Pentesting Tool Just Hit a Wall</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:01.000Z</news:publication_date>
      <news:title>Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/gpubreach-root-shell-access-achieved-via-gpu-rowhammer-attack</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:30:15.000Z</news:publication_date>
      <news:title>GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:29:31.000Z</news:publication_date>
      <news:title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/the-hidden-cost-of-recurring-credential-incidents</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:28:36.000Z</news:publication_date>
      <news:title>The Hidden Cost of Recurring Credential Incidents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:27:46.000Z</news:publication_date>
      <news:title>[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/life-imprisonment-for-cambodian-scam-compound-operators-but-will-it-make-a-diffe</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:29:14.000Z</news:publication_date>
      <news:title>Life imprisonment for Cambodian scam compound operators  but will it make a difference?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/white-house-seeks-to-slash-cisa-funding-by-707-million</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:28:25.000Z</news:publication_date>
      <news:title>White House Seeks to Slash CISA Funding by $707 Million</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/german-police-unmask-revil-ransomware-leader</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:27:45.000Z</news:publication_date>
      <news:title>German Police Unmask REvil Ransomware Leader</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T08:07:46.000Z</news:publication_date>
      <news:title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:29:48.000Z</news:publication_date>
      <news:title>Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:29:06.000Z</news:publication_date>
      <news:title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/german-authorities-identify-revil-and-gandcrab-ransomware-bosses</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:28:32.000Z</news:publication_date>
      <news:title>German authorities identify REvil and GandCrab ransomware bosses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/ai-assisted-supply-chain-attack-targets-github</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:27:51.000Z</news:publication_date>
      <news:title>AI-Assisted Supply Chain Attack Targets GitHub</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/fortinet-issues-emergency-patch-for-forticlient-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T00:30:18.000Z</news:publication_date>
      <news:title>Fortinet Issues Emergency Patch for FortiClient Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/axios-attack-shows-social-complex-engineering-is-industrialized</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T00:29:42.000Z</news:publication_date>
      <news:title>Axios Attack Shows Social Complex Engineering Is Industrialized</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T00:28:27.000Z</news:publication_date>
      <news:title>New GPUBreach attack enables system takeover via GPU rowhammer</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/german-authorities-identify-revil-and-gangcrab-ransomware-bosses</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T00:27:46.000Z</news:publication_date>
      <news:title>German authorities identify REvil and GangCrab ransomware bosses</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/google-deepmind-researchers-map-web-attacks-against-ai-agents</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:30:48.000Z</news:publication_date>
      <news:title>Google DeepMind Researchers Map Web Attacks Against AI Agents</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/shadow-ai-in-healthcare-is-here-to-stay-retry</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:30:08.000Z</news:publication_date>
      <news:title>Shadow AI in Healthcare Is Here to Stay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/automated-credential-harvesting-campaign-exploits-react2shell-flaw</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:29:24.000Z</news:publication_date>
      <news:title>Automated Credential Harvesting Campaign Exploits React2Shell Flaw</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:28:35.000Z</news:publication_date>
      <news:title>Microsoft fixes Classic Outlook bug causing email delivery issues</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:27:49.000Z</news:publication_date>
      <news:title>Disgruntled researcher leaks BlueHammer Windows zero-day exploit</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organiz</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:08:00.000Z</news:publication_date>
      <news:title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-kore</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:30:46.000Z</news:publication_date>
      <news:title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:30:02.000Z</news:publication_date>
      <news:title>CISA orders feds to patch exploited Fortinet EMS flaw by Friday</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/drift-280m-crypto-theft-linked-to-6-month-in-person-operation</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:29:20.000Z</news:publication_date>
      <news:title>Drift $280M crypto theft linked to 6-month in-person operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:28:37.000Z</news:publication_date>
      <news:title>Microsoft links Medusa ransomware affiliate to zero-day attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/microsoft-removes-support-and-recovery-assistant-from-windows</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:27:50.000Z</news:publication_date>
      <news:title>Microsoft removes Support and Recovery Assistant from Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/shadow-ai-in-healthcare-is-here-to-stay</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:30:28.000Z</news:publication_date>
      <news:title>Shadow AI in Healthcare is Here to Stay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:29:32.000Z</news:publication_date>
      <news:title>Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:28:45.000Z</news:publication_date>
      <news:title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/owasp-genai-security-project-gets-update-new-tools-matrix</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:27:58.000Z</news:publication_date>
      <news:title>OWASP GenAI Security Project Gets Update, New Tools Matrix</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:26.000Z</news:publication_date>
      <news:title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/why-simple-breach-monitoring-is-no-longer-enough</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:26.000Z</news:publication_date>
      <news:title>Why Simple Breach Monitoring is No Longer Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:26.000Z</news:publication_date>
      <news:title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/fortinet-rushes-emergency-fixes-for-exploited-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:29:55.000Z</news:publication_date>
      <news:title>Fortinet Rushes Emergency Fixes for Exploited Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/north-korean-hackers-target-high-profile-nodejs-maintainers</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:29:15.000Z</news:publication_date>
      <news:title>North Korean Hackers Target High-Profile Node.js Maintainers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/guardarian-users-targeted-with-malicious-strapi-npm-packages</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:28:36.000Z</news:publication_date>
      <news:title>Guardarian Users Targeted With Malicious Strapi NPM Packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:27:49.000Z</news:publication_date>
      <news:title>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:27:53.000Z</news:publication_date>
      <news:title>Germany Doxes UNKN, Head of RU Ransomware Gangs REvil, GandCrab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:27:44.000Z</news:publication_date>
      <news:title>New FortiClient EMS flaw exploited in attacks, emergency patch released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T20:07:25.000Z</news:publication_date>
      <news:title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T20:07:25.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
</urlset>