<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
<url>
  <loc>https://hackwatch.io/alert/canistersprawl-self-propagating-npm-malware-exploits-trusted-packages-to-steal-data-and-sp</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T16:16:43Z</news:publication_date>
    <news:title>CanisterSprawl: Self-Propagating npm Malware Exploits Trusted Packages to Steal Data and Spread</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/three-trees-data-leak-exposes-personal-information-of-over-40000-customers-and-delivery-dr</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T14:16:21Z</news:publication_date>
    <news:title>Three Trees Data Leak Exposes Personal Information of Over 40,000 Customers and Delivery Drivers</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/critical-vulnerabilities-in-milesight-cameras-expose-devices-to-remote-code-execution-and-</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T13:58:10Z</news:publication_date>
    <news:title>CISA Adds CVE-2026-39987 Marimo Remote Code Execution Vulnerability to Known Exploited Vulnerabilities Catalog</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/critical-path-traversal-vulnerability-cve-2026-6074-in-intrado-911-emergency-gateway-expos</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T13:42:24Z</news:publication_date>
    <news:title>Critical Path Traversal Vulnerability CVE-2026-6074 in Intrado 911 Emergency Gateway Exposes Emergency Services to High-Risk Exploitation</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/critical-vulnerabilities-in-spicejet-online-booking-system-expose-passenger-data-globally</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T13:39:45Z</news:publication_date>
    <news:title>Critical Vulnerabilities in SpiceJet Online Booking System Expose Passenger Data Globally</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/critical-weak-authentication-vulnerability-in-yadea-t5-electric-bicycle-enables-theft-risk</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T13:35:52Z</news:publication_date>
    <news:title>Critical Weak Authentication Vulnerability in Yadea T5 Electric Bicycle Enables Theft Risk</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/uks-ncsc-declares-passkeys-as-default-authentication-declares-passwords-obsolete</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T13:08:39Z</news:publication_date>
    <news:title>UK’s NCSC Declares Passkeys the Default Authentication Standard, Phasing Out Passwords</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/south-african-credentials-flood-dark-web-amid-rising-data-breach-wave</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T11:30:47Z</news:publication_date>
    <news:title>South African Credentials Flood Dark Web Amid Rising Data Breach Wave</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/microsoft-integrates-anthropics-mythos-ai-to-revolutionize-secure-software-development</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T09:25:18Z</news:publication_date>
    <news:title>Microsoft Integrates Anthropic’s Mythos AI to Revolutionize Secure Software Development</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/mozilla-and-anthropics-mythos-ai-uncover-271-zero-day-vulnerabilities-in-firefox-150</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T06:04:17Z</news:publication_date>
    <news:title>Claude Mythos AI Uncovers 271 Zero-Day Vulnerabilities in Firefox 150</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/critical-flaws-in-serial-to-ethernet-converters-threaten-industrial-and-healthcare-infrast</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-23T03:07:17Z</news:publication_date>
    <news:title>Critical Flaws in Serial-to-Ethernet Converters Threaten Industrial and Healthcare Infrastructure</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/anthropics-mcp-vulnerability-exposes-critical-risks-in-ai-agentic-infrastructure</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-22T18:40:25Z</news:publication_date>
    <news:title>Anthropic’s MCP Vulnerability Exposes Critical Risks in AI Agentic Infrastructure</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/trojanized-android-app-sparks-surge-in-nfc-fraud-in-brazil</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-22T11:40:10Z</news:publication_date>
    <news:title>Hackers Exploit Trojanized NFC Tap-to-Pay App to Clone Cards and Drain Accounts</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/april-2026-cybersecurity-crisis-ai-model-breach-windows-domain-controller-failures-and-mar</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-04-22T10:04:57.486433Z</news:publication_date>
    <news:title>April 2026 Cybersecurity Crisis: AI Model Breach, Windows Domain Controller Failures, and Maritime Cyber Threats</news:title>
  </news:news>
</url>
</urlset>