<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://www.hackwire.news/news/shadow-ai-in-healthcare-is-here-to-stay</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:30:28.000Z</news:publication_date>
      <news:title>Shadow AI in Healthcare is Here to Stay</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:29:32.000Z</news:publication_date>
      <news:title>Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:28:45.000Z</news:publication_date>
      <news:title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/owasp-genai-security-project-gets-update-new-tools-matrix</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:27:58.000Z</news:publication_date>
      <news:title>OWASP GenAI Security Project Gets Update, New Tools Matrix</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:26.000Z</news:publication_date>
      <news:title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/why-simple-breach-monitoring-is-no-longer-enough</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:26.000Z</news:publication_date>
      <news:title>Why Simple Breach Monitoring is No Longer Enough</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:07:26.000Z</news:publication_date>
      <news:title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/fortinet-rushes-emergency-fixes-for-exploited-zero-day</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:29:55.000Z</news:publication_date>
      <news:title>Fortinet Rushes Emergency Fixes for Exploited Zero-Day</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/north-korean-hackers-target-high-profile-nodejs-maintainers</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:29:15.000Z</news:publication_date>
      <news:title>North Korean Hackers Target High-Profile Node.js Maintainers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/guardarian-users-targeted-with-malicious-strapi-npm-packages</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:28:36.000Z</news:publication_date>
      <news:title>Guardarian Users Targeted With Malicious Strapi NPM Packages</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:27:49.000Z</news:publication_date>
      <news:title>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:27:53.000Z</news:publication_date>
      <news:title>Germany Doxes UNKN, Head of RU Ransomware Gangs REvil, GandCrab</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T21:27:44.000Z</news:publication_date>
      <news:title>New FortiClient EMS flaw exploited in attacks, emergency patch released</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T20:07:25.000Z</news:publication_date>
      <news:title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T20:07:25.000Z</news:publication_date>
      <news:title>Traffic violation scams switch to QR codes in new phishing texts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/hackers-exploit-react2shell-in-automated-credential-theft-campaign</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:27:50.000Z</news:publication_date>
      <news:title>Hackers exploit React2Shell in automated credential theft campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:28:25.000Z</news:publication_date>
      <news:title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implan</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:27:45.000Z</news:publication_date>
      <news:title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T21:27:44.000Z</news:publication_date>
      <news:title>Axios npm hack used fake Teams error fix to hijack maintainer account</news:title>
    </news:news>
  </url>
</urlset>