<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
<url>
  <loc>https://hackwatch.io/alert/phishers-exploit-amazon-ses-to-slip-past-email-security-filters</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T20:03:28Z</news:publication_date>
    <news:title>Phishers Exploit Amazon SES to Slip Past Email Security Filters</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/phishing-campaign-exploits-simplehelp-and-screenconnect-rmm-tools-to-target-over-80-organi</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T18:06:00Z</news:publication_date>
    <news:title>Phishing Campaign Exploits SimpleHelp and ScreenConnect RMM Tools to Target Over 80 Organizations</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/microsoft-flags-multi-stage-phishing-campaign-exploiting-code-of-conduct-themes-to-steal-t</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T15:00:00Z</news:publication_date>
    <news:title>Microsoft Flags Multi-Stage Phishing Campaign Exploiting Code of Conduct Themes to Steal Tokens</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/identity-remains-prime-target-as-endpoint-and-cloud-threats-expand</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T13:20:00Z</news:publication_date>
    <news:title>Identity Remains Prime Target as Endpoint and Cloud Threats Expand</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/canvas-breach-exposes-data-of-275-million-users-across-9000-schools</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T12:38:18Z</news:publication_date>
    <news:title>Canvas Breach Exposes Data of 275 Million Users Across 9,000 Schools</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/new-botnet-exploits-misconfigured-jenkins-servers-to-target-gaming-platforms</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T10:54:00Z</news:publication_date>
    <news:title>New Botnet Exploits Misconfigured Jenkins Servers to Target Gaming Platforms</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/exploitation-of-copy-fail-linux-vulnerability-reported-amid-early-attacks</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T09:57:28Z</news:publication_date>
    <news:title>CISA Adds &apos;Copy Fail&apos; Linux Vulnerability to Known Exploited List, Urges Immediate Patching</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/cybercriminals-harness-ai-to-accelerate-zero-day-vulnerability-exploitation</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T08:59:14Z</news:publication_date>
    <news:title>Cybercriminals Harness AI to Accelerate Zero-Day Vulnerability Exploitation</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/multiple-threat-actors-exploit-critical-cpanel-vulnerability-cve-2026-41940</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T08:43:11Z</news:publication_date>
    <news:title>Multiple Threat Actors Exploit Critical cPanel Vulnerability CVE-2026-41940</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/linux-ransomware-exploits-critical-cpanel-vulnerability-to-spread</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-04T07:55:00Z</news:publication_date>
    <news:title>Linux Ransomware Exploits Critical cPanel Vulnerability to Spread</news:title>
  </news:news>
</url>
<url>
  <loc>https://hackwatch.io/alert/instructure-confirms-data-breach-amid-shinyhunters-extortion-claims</loc>
  <news:news>
    <news:publication>
      <news:name>HackWatch</news:name>
      <news:language>en</news:language>
    </news:publication>
    <news:publication_date>2026-05-03T22:16:27Z</news:publication_date>
    <news:title>ShinyHunters Group Takes Credit for Massive Data Breach at EdTech Firm Instructure</news:title>
  </news:news>
</url>
</urlset>