<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 22, 2026 at 12:22 am by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybertrove.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Trove</title>
		<link><![CDATA[https://thecybertrove.com]]></link>
		<description><![CDATA[The Cyber Trove]]></description>
		<lastBuildDate><![CDATA[Tue, 21 Apr 2026 20:13:39 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybertrove.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybertrove.com/agoda-data-breach-82m-records-booking-com-hack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/agoda-data-breach-82m-records-booking-com-hack/]]></link>
			<title>82M Agoda Records Allegedly Leaked After Booking.com Hack</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 20:13:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/everest-ransomware-frost-citizens-bank-data-breach/]]></guid>
			<link><![CDATA[https://thecybertrove.com/everest-ransomware-frost-citizens-bank-data-breach/]]></link>
			<title>Millions at Risk as Everest Targets Frost &amp; Citizens Bank</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:59:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/apache-syncope-rce-vulnerability-cve-2025-57738/]]></guid>
			<link><![CDATA[https://thecybertrove.com/apache-syncope-rce-vulnerability-cve-2025-57738/]]></link>
			<title>Apache Syncope RCE Vulnerability CVE-2025-57738 Explained</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:06:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sapphire-sleet-macos-fake-zoom-update-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sapphire-sleet-macos-fake-zoom-update-attack/]]></link>
			<title>Sapphire Sleet macOS Attack Uses Social Engineering</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:55:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/ai-ngate-malware-nfc-payment-android/]]></guid>
			<link><![CDATA[https://thecybertrove.com/ai-ngate-malware-nfc-payment-android/]]></link>
			<title>AI-Powered NGate Malware Targets NFC Payment Apps</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:47:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sidewinder-phishing-fake-pdf-zimbra-credential-theft/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sidewinder-phishing-fake-pdf-zimbra-credential-theft/]]></link>
			<title>SideWinder Phishing Uses Fake Chrome PDF &amp; Zimbra Clone</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:37:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/github-ai-prompt-injection-copilot-claude-gemini/]]></guid>
			<link><![CDATA[https://thecybertrove.com/github-ai-prompt-injection-copilot-claude-gemini/]]></link>
			<title>GitHub AI Agents Hit by Prompt Injection via Comments</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:22:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/axios-npm-supply-chain-attack-rat-cisa-warning/]]></guid>
			<link><![CDATA[https://thecybertrove.com/axios-npm-supply-chain-attack-rat-cisa-warning/]]></link>
			<title>Axios npm Supply Chain Attack Impacts Developers</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:04:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sglang-cve-2026-5760-ai-model-rce-exploit/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sglang-cve-2026-5760-ai-model-rce-exploit/]]></link>
			<title>GGUF Model Flaw Enables RCE on SGLang AI Servers</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:46:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/stealtok-malware-tiktok-browser-extensions-spyware/]]></guid>
			<link><![CDATA[https://thecybertrove.com/stealtok-malware-tiktok-browser-extensions-spyware/]]></link>
			<title>StealTok Campaign Turns TikTok Extensions into Spyware</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:34:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/ai-exploitation-collapsing-patch-window-cybersecurity/]]></guid>
			<link><![CDATA[https://thecybertrove.com/ai-exploitation-collapsing-patch-window-cybersecurity/]]></link>
			<title>AI-Powered Exploits Are Collapsing the Patch Window</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:21:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fortigate-vpn-nightmare-eclipse-beige-burrow-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fortigate-vpn-nightmare-eclipse-beige-burrow-attack/]]></link>
			<title>FortiGate VPN Breach Triggers Nightmare-Eclipse Tool Attacks</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:10:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/activemq-cve-2026-34197-exposed-servers/]]></guid>
			<link><![CDATA[https://thecybertrove.com/activemq-cve-2026-34197-exposed-servers/]]></link>
			<title>Apache ActiveMQ Vulnerability Exposes 6,000+ Servers</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:00:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/gh0st-rat-cloverplus-dual-malware-campaign/]]></guid>
			<link><![CDATA[https://thecybertrove.com/gh0st-rat-cloverplus-dual-malware-campaign/]]></link>
			<title>Gh0st RAT &amp; CloverPlus Adware: Dual Malware Campaign Explained</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:43:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/appdomain-hijacking-intel-tool-malware-loader/]]></guid>
			<link><![CDATA[https://thecybertrove.com/appdomain-hijacking-intel-tool-malware-loader/]]></link>
			<title>AppDomain Hijacking Attack Turns Intel Tool Into Malware Loader</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:33:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/anthropic-mcp-vulnerability-rce-ai-security/]]></guid>
			<link><![CDATA[https://thecybertrove.com/anthropic-mcp-vulnerability-rce-ai-security/]]></link>
			<title>Anthropic MCP Vulnerability Enables Critical RCE Attacks</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:23:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/gardyn-smart-garden-iot-vulnerabilities-remote-takeover/]]></guid>
			<link><![CDATA[https://thecybertrove.com/gardyn-smart-garden-iot-vulnerabilities-remote-takeover/]]></link>
			<title>Gardyn Smart Garden Flaws Expose Critical Remote Takeover Risk</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:01:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sms-phishing-sim-swapping-crypto-theft-explained/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sms-phishing-sim-swapping-crypto-theft-explained/]]></link>
			<title>SMS Phishing &amp; SIM Swapping Attacks: Million-Dollar Crypto Heist</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:49:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/iterm2-rce-escape-sequence-vulnerability/]]></guid>
			<link><![CDATA[https://thecybertrove.com/iterm2-rce-escape-sequence-vulnerability/]]></link>
			<title>iTerm2 RCE Vulnerability: When Text Output Becomes Code Execution</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:28:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/windows-snipping-tool-ntlm-hash-leak-cve-2026-33829/]]></guid>
			<link><![CDATA[https://thecybertrove.com/windows-snipping-tool-ntlm-hash-leak-cve-2026-33829/]]></link>
			<title>Windows Snipping Tool NTLM Hash Leak: Exploit &amp; Defense Guide</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 06:37:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/ai-incident-response-codex-failure/]]></guid>
			<link><![CDATA[https://thecybertrove.com/ai-incident-response-codex-failure/]]></link>
			<title>AI Incident Response Failure: Codex Misleads Active Cyberattack Investigation</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:11:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/hotel-data-leak-5m-guests-booking-platforms/]]></guid>
			<link><![CDATA[https://thecybertrove.com/hotel-data-leak-5m-guests-booking-platforms/]]></link>
			<title>Hotel Guest Data Leak Hits 5M Users via Booking Platforms</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 14:01:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/galaxy-s26-ultra-trade-in-scam-marketplace-fraud/]]></guid>
			<link><![CDATA[https://thecybertrove.com/galaxy-s26-ultra-trade-in-scam-marketplace-fraud/]]></link>
			<title>Samsung Galaxy S26 Ultra Trade-In Scam Exposes Marketplace Risk</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:55:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/germany-cyber-extortion-attacks-rise-2025/]]></guid>
			<link><![CDATA[https://thecybertrove.com/germany-cyber-extortion-attacks-rise-2025/]]></link>
			<title>Cyberattacks on Germany Surge as Extortion Campaigns Rise</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:49:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/gentlemen-ransomware-systembc-botnet-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/gentlemen-ransomware-systembc-botnet-attack/]]></link>
			<title>Gentlemen Ransomware Uses SystemBC Botnet for Large-Scale Attacks</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/teams-helpdesk-impersonation-quick-assist-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/teams-helpdesk-impersonation-quick-assist-attack/]]></link>
			<title>Microsoft Teams Helpdesk Impersonation Attack Explained</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:53:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fake-video-meetings-cyberattack-crypto/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fake-video-meetings-cyberattack-crypto/]]></link>
			<title>Fake Video Meetings Cyberattack: UNC1069 Crypto Threat Exposed</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:23:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/maritime-cyber-resilience-singapore-hamburg-mou/]]></guid>
			<link><![CDATA[https://thecybertrove.com/maritime-cyber-resilience-singapore-hamburg-mou/]]></link>
			<title>Global Port Security: Singapore and Germany Unite for Maritime Cyber Resilience</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:09:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/nsa-anthropic-mythos-ai-pentagon-blacklist/]]></guid>
			<link><![CDATA[https://thecybertrove.com/nsa-anthropic-mythos-ai-pentagon-blacklist/]]></link>
			<title>Shocking: NSA Uses &#8220;Dangerous&#8221; Mythos AI Despite Pentagon Ban</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:42:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/windows-11-build-26300-secure-boot-fat32-update/]]></guid>
			<link><![CDATA[https://thecybertrove.com/windows-11-build-26300-secure-boot-fat32-update/]]></link>
			<title>Windows 11 Build 26300: New Secure Boot Monitoring &amp; Storage Fixes</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:28:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/microsoft-teams-launch-failure-tm1283300-fix/]]></guid>
			<link><![CDATA[https://thecybertrove.com/microsoft-teams-launch-failure-tm1283300-fix/]]></link>
			<title>Microsoft Teams Launch Failures: Fixing the Build-Caching Outage (TM1283300)</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:15:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/janaware-ransomware-adwind-rat-turkey/]]></guid>
			<link><![CDATA[https://thecybertrove.com/janaware-ransomware-adwind-rat-turkey/]]></link>
			<title>JanaWare Ransomware: How Customized Adwind RAT Targets Turkish Users</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:07:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/miningdropper-android-malware-banking-rat/]]></guid>
			<link><![CDATA[https://thecybertrove.com/miningdropper-android-malware-banking-rat/]]></link>
			<title>MiningDropper Android Malware Spreads Banking Trojans &amp; RATs</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 14:26:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/athr-voice-fraud-platform-ai-vishing-attacks/]]></guid>
			<link><![CDATA[https://thecybertrove.com/athr-voice-fraud-platform-ai-vishing-attacks/]]></link>
			<title>Cybercrime Goes Plug-and-Play: ATHR Voice Fraud Platform Explained</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:44:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/google-gemini-ai-blocks-malicious-ads/]]></guid>
			<link><![CDATA[https://thecybertrove.com/google-gemini-ai-blocks-malicious-ads/]]></link>
			<title>Google Blocks 8.3B Malicious Ads Using Gemini AI</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 12:05:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/nist-risk-based-nvd-model-cve/]]></guid>
			<link><![CDATA[https://thecybertrove.com/nist-risk-based-nvd-model-cve/]]></link>
			<title>NIST Adopts Risk-Based NVD Model Amid CVE Surge</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:47:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/notion-data-leak-public-pages/]]></guid>
			<link><![CDATA[https://thecybertrove.com/notion-data-leak-public-pages/]]></link>
			<title>Notion Data Leak Exposes Emails and Profiles on Public Pages</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:35:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fud-crypt-malware-microsoft-signed/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fud-crypt-malware-microsoft-signed/]]></link>
			<title>FUD Crypt Malware Uses Microsoft-Signed Binaries to Evade Detection</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:28:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/microsoft-rdp-security-update-unknown-connections/]]></guid>
			<link><![CDATA[https://thecybertrove.com/microsoft-rdp-security-update-unknown-connections/]]></link>
			<title>Microsoft RDP Security Update Warns of Unknown Connections</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:25:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/vercel-data-breach-oauth-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/vercel-data-breach-oauth-attack/]]></link>
			<title>Vercel Data Breach: OAuth Attack Exposes Internal Systems</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:10:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/critical-mcp-vulnerability-ai-rce/]]></guid>
			<link><![CDATA[https://thecybertrove.com/critical-mcp-vulnerability-ai-rce/]]></link>
			<title>Critical MCP Vulnerability Enables Remote Code Execution in AI Frameworks</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 06:59:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/qemu-vm-attack-windows-security-bypass/]]></guid>
			<link><![CDATA[https://thecybertrove.com/qemu-vm-attack-windows-security-bypass/]]></link>
			<title>QEMU VM Attack: Hackers Bypass Windows Security Tools</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:37:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/nist-cve-changes-europe-cyber-sovereignty/]]></guid>
			<link><![CDATA[https://thecybertrove.com/nist-cve-changes-europe-cyber-sovereignty/]]></link>
			<title>NIST CVE Changes: A Turning Point for Cyber Sovereignty</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 12:15:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/bol-webshop-data-leak-400k-records/]]></guid>
			<link><![CDATA[https://thecybertrove.com/bol-webshop-data-leak-400k-records/]]></link>
			<title>Bol Webshop Data Leak Claim: 400K Customer Records Allegedly Exposed</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:01:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/shinyhunters-breach-9m-records-pay-or-leak/]]></guid>
			<link><![CDATA[https://thecybertrove.com/shinyhunters-breach-9m-records-pay-or-leak/]]></link>
			<title>Massive ShinyHunters Breach Puts 9M Records at Risk</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 12:00:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/iphone-passcode-bug-ios-lockout-risk/]]></guid>
			<link><![CDATA[https://thecybertrove.com/iphone-passcode-bug-ios-lockout-risk/]]></link>
			<title>iPhone Passcode Bug: Hidden Risk in iOS Security Updates</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 17:31:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/lovable-api-bola-flaw-data-exposure/]]></guid>
			<link><![CDATA[https://thecybertrove.com/lovable-api-bola-flaw-data-exposure/]]></link>
			<title>Lovable API BOLA Vulnerability Exposes Thousands of Projects</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:40:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/ai-exploit-chains-cybersecurity-threat/]]></guid>
			<link><![CDATA[https://thecybertrove.com/ai-exploit-chains-cybersecurity-threat/]]></link>
			<title>AI-Powered Exploit Chains: The New Cybersecurity Threat Landscape</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 17:23:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fiverr-data-breach-cloudinary-misconfiguration/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fiverr-data-breach-cloudinary-misconfiguration/]]></link>
			<title>Fiverr Data Breach: Cloudinary Misconfiguration Exposes Files</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 11:05:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/iran-mois-multi-persona-cyber-campaign/]]></guid>
			<link><![CDATA[https://thecybertrove.com/iran-mois-multi-persona-cyber-campaign/]]></link>
			<title>Iranian MOIS Multi-Persona Cyber Campaign: A New Era of Cyber Warfare</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:32:10 +0000]]></pubDate>
		</item>
				</channel>
</rss>
