<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 30, 2026 at 5:31 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybertrove.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Trove</title>
		<link><![CDATA[https://thecybertrove.com]]></link>
		<description><![CDATA[The Cyber Trove]]></description>
		<lastBuildDate><![CDATA[Thu, 30 Apr 2026 17:13:24 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybertrove.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybertrove.com/jenkins-plugin-security-patches-path-traversal-xss/]]></guid>
			<link><![CDATA[https://thecybertrove.com/jenkins-plugin-security-patches-path-traversal-xss/]]></link>
			<title>Critical Jenkins Alert: High-Severity Flaws Threaten CI/CD Pipelines</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:13:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/wordpress-plugin-supply-chain-attack-quick-page-redirect/]]></guid>
			<link><![CDATA[https://thecybertrove.com/wordpress-plugin-supply-chain-attack-quick-page-redirect/]]></link>
			<title>The 5-Year Sleeper: Popular WordPress Plugin &#8220;Hacked&#8221; Since 2020 to Inject Secret Code</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 13:49:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/openai-cybersecurity-action-plan-2026-tac-program/]]></guid>
			<link><![CDATA[https://thecybertrove.com/openai-cybersecurity-action-plan-2026-tac-program/]]></link>
			<title>OpenAI Unveils 5-Point Plan to &#8220;Democratize&#8221; AI Cyber Defense</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/karsto-rat-malware-webcam-surveillance-roblox-scam/]]></guid>
			<link><![CDATA[https://thecybertrove.com/karsto-rat-malware-webcam-surveillance-roblox-scam/]]></link>
			<title>Warning: &#8220;KarstoRAT&#8221; Malware Targets Gamers to Hijack Webcams and Microphones</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:26:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/qinglong-rce-vulnerability-cryptominer-exploit-2026/]]></guid>
			<link><![CDATA[https://thecybertrove.com/qinglong-rce-vulnerability-cryptominer-exploit-2026/]]></link>
			<title>Critical &#8220;Qinglong&#8221; 0-Day Is Hijacking Linux Servers</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:23:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/promptmink-malware-claude-ai-supply-chain-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/promptmink-malware-claude-ai-supply-chain-attack/]]></link>
			<title>Warning: New AI Malware Is Secretly Stealing Crypto Keys</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:17:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/cve-mcp-server-claude-ai-security-analyst-tools/]]></guid>
			<link><![CDATA[https://thecybertrove.com/cve-mcp-server-claude-ai-security-analyst-tools/]]></link>
			<title>Critical Update: New Claude &#8220;Super-Analyst&#8221; Tool Triage 27 Security Sources in Seconds</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:12:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/linux-kernel-copy-fail-0-day-cve-2026-31431-root-exploit/]]></guid>
			<link><![CDATA[https://thecybertrove.com/linux-kernel-copy-fail-0-day-cve-2026-31431-root-exploit/]]></link>
			<title>Critical Linux Warning: New &#8220;Copy Fail&#8221; 0-Day Grants Instant Root</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:06:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/lazarus-group-macho-man-macos-malware-analysis/]]></guid>
			<link><![CDATA[https://thecybertrove.com/lazarus-group-macho-man-macos-malware-analysis/]]></link>
			<title>The Apple Heist: Lazarus Group’s &#8220;Mach-O Man&#8221; Malware Targets macOS</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 18:28:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/cursor-ai-vulnerability-extension-credential-compromise/]]></guid>
			<link><![CDATA[https://thecybertrove.com/cursor-ai-vulnerability-extension-credential-compromise/]]></link>
			<title>Warning: AI Coding Tools at Risk—Cursor Vulnerability Exposes All Your Developer Tokens</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sap-npm-packages-mini-shai-hulud-compromise-2026/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sap-npm-packages-mini-shai-hulud-compromise-2026/]]></link>
			<title>5 Ways the &#8220;Mini Shai-Hulud&#8221; Worm Steals Your CI/CD Secrets</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 17:54:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/zetachain-syndicate-defi-hack-april-2026-analysis/]]></guid>
			<link><![CDATA[https://thecybertrove.com/zetachain-syndicate-defi-hack-april-2026-analysis/]]></link>
			<title>Cross-Chain Crisis: ZetaChain and Syndicate Hit in $1.5M DeFi Exploits</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:47:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/cpanel-auth-bypass-cve-2026-41940-poc-released/]]></guid>
			<link><![CDATA[https://thecybertrove.com/cpanel-auth-bypass-cve-2026-41940-poc-released/]]></link>
			<title>Warning: Critical cPanel 0-Day Hijacks Servers — Patch Now to Prevent Root Compromise</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:53:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/europol-busts-50-million-albania-scam-call-centres/]]></guid>
			<link><![CDATA[https://thecybertrove.com/europol-busts-50-million-albania-scam-call-centres/]]></link>
			<title>Warning: Police Bust Corporate-Style Scam Network After €50 Million Fraud</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:48:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sonicwall-sonicos-vulnerabilities-cve-2026-0204-patch-alert/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sonicwall-sonicos-vulnerabilities-cve-2026-0204-patch-alert/]]></link>
			<title>Warning: Critical SonicWall Flaws Allow Hackers to Bypass Security and Crash Firewalls</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:43:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/etherrat-malware-trojanized-tftpd64-crypto-theft/]]></guid>
			<link><![CDATA[https://thecybertrove.com/etherrat-malware-trojanized-tftpd64-crypto-theft/]]></link>
			<title>Warning: This Dangerous New Malware Steals Your Crypto and Files</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:38:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/malicious-tanstack-npm-package-steals-env-secrets/]]></guid>
			<link><![CDATA[https://thecybertrove.com/malicious-tanstack-npm-package-steals-env-secrets/]]></link>
			<title>Brand-Squatting Alert: Fake &#8220;tanstack&#8221; npm Package Steals Developer Secrets</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:34:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/proftpd-sql-injection-vulnerability-cve-2026-42167-rce/]]></guid>
			<link><![CDATA[https://thecybertrove.com/proftpd-sql-injection-vulnerability-cve-2026-42167-rce/]]></link>
			<title>ProFTPD SQL Injection: The Stealthy Route to Full Server Takeover</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:26:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/cisa-kev-connectwise-screenconnect-vulnerability-cve-2024-1708/]]></guid>
			<link><![CDATA[https://thecybertrove.com/cisa-kev-connectwise-screenconnect-vulnerability-cve-2024-1708/]]></link>
			<title>CISA Sounds Alarm: Remote Access Flaw Hits &#8220;Must-Patch&#8221; List</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:21:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/peter-stokes-bouquet-scattered-spider-arrest-finland-2026/]]></guid>
			<link><![CDATA[https://thecybertrove.com/peter-stokes-bouquet-scattered-spider-arrest-finland-2026/]]></link>
			<title>Arresting the &#8220;Bouquet&#8221;: FBI Targets Scattered Spider’s Help Desk Specialist</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:39:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/bluenoroff-ai-generated-zoom-scams-fileless-powershell/]]></guid>
			<link><![CDATA[https://thecybertrove.com/bluenoroff-ai-generated-zoom-scams-fileless-powershell/]]></link>
			<title>Deepfake Deadlock: BlueNoroff’s AI-Powered Zoom Heist</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:33:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/vect-2-0-ransomware-data-wiper-flaw-analysis/]]></guid>
			<link><![CDATA[https://thecybertrove.com/vect-2-0-ransomware-data-wiper-flaw-analysis/]]></link>
			<title>Pay the Ransom, Lose Your Data: The VECT 2.0 &#8220;Wiper&#8221; Flaw</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:31:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/google-chrome-critical-security-update-april-2026-rce/]]></guid>
			<link><![CDATA[https://thecybertrove.com/google-chrome-critical-security-update-april-2026-rce/]]></link>
			<title>Memory Under Fire: Google Patches 30 Flaws in Critical Chrome Update</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:27:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/hugging-face-lerobot-rce-pickle-vulnerability-cve-2026-25874/]]></guid>
			<link><![CDATA[https://thecybertrove.com/hugging-face-lerobot-rce-pickle-vulnerability-cve-2026-25874/]]></link>
			<title>AI Under Control: Unauthenticated RCE Flaw Hits Hugging Face LeRobot</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:22:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/cisa-kev-windows-shell-zero-click-cve-2026-32202/]]></guid>
			<link><![CDATA[https://thecybertrove.com/cisa-kev-windows-shell-zero-click-cve-2026-32202/]]></link>
			<title>CISA Alert: &#8220;Fancy Bear&#8221; Zero-Click Vulnerability Hits Windows Shell</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:18:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/vimeo-data-breach-shinyhunters-anodot-supply-chain/]]></guid>
			<link><![CDATA[https://thecybertrove.com/vimeo-data-breach-shinyhunters-anodot-supply-chain/]]></link>
			<title>Supply Chain Strike: ShinyHunters Targets Vimeo via Analytics Vendor</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:15:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/lofystealer-minecraft-cheat-malware-analysis/]]></guid>
			<link><![CDATA[https://thecybertrove.com/lofystealer-minecraft-cheat-malware-analysis/]]></link>
			<title>Gaming the System: LofyStealer’s In-Memory Attack on Minecraft Players</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:09:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/slotagent-malware-api-hashing-evasion-analysis/]]></guid>
			<link><![CDATA[https://thecybertrove.com/slotagent-malware-api-hashing-evasion-analysis/]]></link>
			<title>The Ghost in the Import Table: Analyzing SLOTAGENT’s Anti-Forensic Engine</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:07:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/cursor-ai-rce-vulnerability-cve-2026-26268-analysis/]]></guid>
			<link><![CDATA[https://thecybertrove.com/cursor-ai-rce-vulnerability-cve-2026-26268-analysis/]]></link>
			<title>The AI Agent Escape: How CVE-2026-26268 Turns &#8220;Git Push&#8221; into an RCE</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 15:50:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/cpanel-whm-critical-authentication-bypass-patch-april-2026/]]></guid>
			<link><![CDATA[https://thecybertrove.com/cpanel-whm-critical-authentication-bypass-patch-april-2026/]]></link>
			<title>Emergency Update: Critical Authentication Bypass Hits cPanel &amp; WHM</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 07:03:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/litellm-sql-injection-cve-2026-42208-ai-key-theft/]]></guid>
			<link><![CDATA[https://thecybertrove.com/litellm-sql-injection-cve-2026-42208-ai-key-theft/]]></link>
			<title>The AI Proxy Trap: CVE-2026-42208 Enables SQL Injection in LiteLLM</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 21:09:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/checkmarx-github-data-leak-supply-chain-incident/]]></guid>
			<link><![CDATA[https://thecybertrove.com/checkmarx-github-data-leak-supply-chain-incident/]]></link>
			<title>Supply Chain Escalation: Checkmarx GitHub Data Leaked on Dark Web</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 21:01:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/windows-11-rdp-security-warning-bug-kb5083769/]]></guid>
			<link><![CDATA[https://thecybertrove.com/windows-11-rdp-security-warning-bug-kb5083769/]]></link>
			<title>Windows 11 Update Bug: Broken RDP Warnings Mask Critical Security Risks</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 20:55:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/github-rce-cve-2026-3854-technical-analysis/]]></guid>
			<link><![CDATA[https://thecybertrove.com/github-rce-cve-2026-3854-technical-analysis/]]></link>
			<title>How GitHub’s Critical RCE Exposed Private Code</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 20:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/business-email-compromise-bec-prevention-guide/]]></guid>
			<link><![CDATA[https://thecybertrove.com/business-email-compromise-bec-prevention-guide/]]></link>
			<title>BlobPhish: How Browser Blob APIs Are Revolutionizing Credential Theft</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 20:38:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sandworm-ssh-over-tor-persistence/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sandworm-ssh-over-tor-persistence/]]></link>
			<title>Sandworm’s New Tradecraft: How SSH-over-Tor Tunnels Create Persistent Backdoors</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 20:29:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/microsoft-copilot-agent-mode-outlook-automation/]]></guid>
			<link><![CDATA[https://thecybertrove.com/microsoft-copilot-agent-mode-outlook-automation/]]></link>
			<title>Microsoft Unleashes &#8220;Agentic&#8221; Copilot: Your Outlook Now Works on Autopilot</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 20:21:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/how-a-massive-chinese-smishing-network-steals-your-data/]]></guid>
			<link><![CDATA[https://thecybertrove.com/how-a-massive-chinese-smishing-network-steals-your-data/]]></link>
			<title>How a Massive Chinese Smishing Network Steals Your Data</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 19:24:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/silver-fox-phishing-byovd-malware-asia/]]></guid>
			<link><![CDATA[https://thecybertrove.com/silver-fox-phishing-byovd-malware-asia/]]></link>
			<title>How Silver Fox Uses Fake Tax Audits to Blind Your Security</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 19:17:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/windows-shell-0-click-smartscreen-bypass-apt28/]]></guid>
			<link><![CDATA[https://thecybertrove.com/windows-shell-0-click-smartscreen-bypass-apt28/]]></link>
			<title>Windows 0-Click Crisis: New Defender Bypass Exploited by APT28</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 19:10:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/whatsapp-native-cloud-backup-passkey-encryption/]]></guid>
			<link><![CDATA[https://thecybertrove.com/whatsapp-native-cloud-backup-passkey-encryption/]]></link>
			<title>WhatsApp to Launch Independent Cloud Backup with Mandatory Encryption and 50GB Tier</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 19:03:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/silk-typhoon-hacker-extradition-xu-zewei/]]></guid>
			<link><![CDATA[https://thecybertrove.com/silk-typhoon-hacker-extradition-xu-zewei/]]></link>
			<title>Extradited: FBI Catches HAFNIUM Hacker in Massive Blow to MSS</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 18:54:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/anatsa-malware-google-play-document-reader/]]></guid>
			<link><![CDATA[https://thecybertrove.com/anatsa-malware-google-play-document-reader/]]></link>
			<title>Anatsa Returns: Fake Document Reader on Google Play Surpasses 10K Downloads</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:29:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/kycshadow-android-banking-malware-whatsapp/]]></guid>
			<link><![CDATA[https://thecybertrove.com/kycshadow-android-banking-malware-whatsapp/]]></link>
			<title>KYCShadow: New Android Banking Malware Exploits Fake KYC Workflows and WhatsApp Delivery</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 12:23:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/google-gemini-cli-rce-vulnerability-cvss-10/]]></guid>
			<link><![CDATA[https://thecybertrove.com/google-gemini-cli-rce-vulnerability-cvss-10/]]></link>
			<title>Critical Warning: New Google Gemini Flaw Hijacks Your System</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:25:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/oilrig-lsb-steganography-google-drive-c2/]]></guid>
			<link><![CDATA[https://thecybertrove.com/oilrig-lsb-steganography-google-drive-c2/]]></link>
			<title>Covert Espionage: OilRig Exploits LSB Steganography and Google Drive for C2 Hidden in Plain Sight</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 12:17:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/linux-elf-malware-evades-ml-detection/]]></guid>
			<link><![CDATA[https://thecybertrove.com/linux-elf-malware-evades-ml-detection/]]></link>
			<title>Breaking MalConv: New Genetic Algorithm Generator Achieves 67% Evasion on Linux ELF Malware</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 12:04:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/openclaw-vulnerabilities-security-patch/]]></guid>
			<link><![CDATA[https://thecybertrove.com/openclaw-vulnerabilities-security-patch/]]></link>
			<title>Mitigating OpenClaw Vulnerabilities: A Guide to AI Agent Security</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/rdp-bitmap-cache-screenshot-reconstruction-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/rdp-bitmap-cache-screenshot-reconstruction-attack/]]></link>
			<title>Persistent Breadcrumbs: How RDP Bitmap Caching Exposes Sensitive Data</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:32:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/lightning-pypi-package-compromised-supply-chain-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/lightning-pypi-package-compromised-supply-chain-attack/]]></link>
			<title>Critical Warning: Popular &#8220;Lightning&#8221; AI Framework Hacked in Massive Supply Chain Attack</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:27:24 +0000]]></pubDate>
		</item>
				</channel>
</rss>
