<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://fraudforensics.online/article/bb260054-3cfe-4575-8529-3b873d336172</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T15:09:44.000Z</news:publication_date>
      <news:title>Critical flaw in Protobuf library enables JavaScript code execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/36addccc-1c1d-4402-af9e-05908082f89d</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T13:45:54.000Z</news:publication_date>
      <news:title>NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, and Proxmox VE 9.0 Support</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/3e2074c2-fbfb-430c-8e60-37180da90b11</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T10:30:00.000Z</news:publication_date>
      <news:title>Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/b6f9a692-0736-4796-9790-7e852622f693</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T07:59:00.000Z</news:publication_date>
      <news:title>$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/03819e05-b2f8-48c3-9d2d-268ca7b1fb88</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-18T06:01:00.000Z</news:publication_date>
      <news:title>Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/5c01808f-5aa1-4578-8644-1eb7fc3baef0</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:51:57.000Z</news:publication_date>
      <news:title>How NIST&apos;s Cutback of CVE Handling Impacts Cyber Teams</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/cb64c8cb-659d-4379-b320-5f899be576c1</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:10:19.000Z</news:publication_date>
      <news:title>Payouts King ransomware uses QEMU VMs to bypass endpoint security</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/15fc0798-a807-4445-afe3-b84ecf0bb532</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:05:51.000Z</news:publication_date>
      <news:title>Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/43386f58-da2d-4586-b0bd-537cade5d1bd</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T19:00:00.000Z</news:publication_date>
      <news:title>White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/97929c5d-e47c-402c-8016-43cde3c294c8</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T18:45:00.000Z</news:publication_date>
      <news:title>Ransomware attack continues to disrupt healthcare in London nearly two years later</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/d367b8c3-caa0-4428-833f-6980e0d018dd</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T18:30:00.000Z</news:publication_date>
      <news:title>Four arrested in latest ‘PowerOFF’ DDoS-for-hire takedown</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/f84affd2-4707-4f8f-a393-8e6825403eac</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T17:31:13.000Z</news:publication_date>
      <news:title>The surveillance law Congress can&amp;#8217;t quit — and can&amp;#8217;t explain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/1cafb3a4-84ae-476e-9176-4467d2422d85</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T15:08:53.000Z</news:publication_date>
      <news:title>Grinex exchange blames &quot;Western intelligence&quot; for $13.7M crypto hack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/0182d6f0-e6e0-47ba-9dfa-540d0230f35f</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T15:00:00.000Z</news:publication_date>
      <news:title>CoChat Launches AI Collaboration Platform to Combat Shadow AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/b129740f-7ca8-4267-a7c8-3e0a7fa91cf5</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:47:18.000Z</news:publication_date>
      <news:title>Every Old Vulnerability Is Now an AI Vulnerability</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/4e9a0206-5b75-48d9-926f-fcf9718e577f</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:12:00.000Z</news:publication_date>
      <news:title>Ukraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/40d59430-5c2c-4ffe-bd33-d85cac9e3b01</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:01:11.000Z</news:publication_date>
      <news:title>Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/4656702d-09ae-47ec-894f-c298ecc8e9ab</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:21:00.000Z</news:publication_date>
      <news:title>Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/f6a13a94-100c-47b2-9ade-e1a2c087d88d</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T13:00:00.000Z</news:publication_date>
      <news:title>Coast Guard&apos;s New Cybersecurity Rules Offers Lessons for CISOs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/0ef85b2d-a6e8-4f80-9e42-dd6debfca05d</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T12:20:28.000Z</news:publication_date>
      <news:title>Webinar: From phishing to fallout — Why MSPs must rethink both security and recovery</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://fraudforensics.online/article/d057f739-38e0-4f8a-be8a-729596a56edd</loc>
    <news:news>
      <news:publication>
        <news:name>Fraud Forensics</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T12:00:00.000Z</news:publication_date>
      <news:title>In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested</news:title>
    </news:news>
  </url>
</urlset>