<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 23, 2026 at 2:40 am by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybertrove.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Trove</title>
		<link><![CDATA[https://thecybertrove.com]]></link>
		<description><![CDATA[The Cyber Trove]]></description>
		<lastBuildDate><![CDATA[Wed, 22 Apr 2026 20:53:34 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybertrove.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybertrove.com/coinmarketcap-data-leak-crypto-users-phishing-risk/]]></guid>
			<link><![CDATA[https://thecybertrove.com/coinmarketcap-data-leak-crypto-users-phishing-risk/]]></link>
			<title>Millions of Crypto Users May Be Exposed as CoinMarketCap Data Appears on Hacker Forums</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:53:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/hikvision-camera-attacks-uk-67-million-exploits/]]></guid>
			<link><![CDATA[https://thecybertrove.com/hikvision-camera-attacks-uk-67-million-exploits/]]></link>
			<title>67 Million Attacks Target Hikvision Cameras in UK Networks</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:44:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/hollywood-studios-cybersecurity-risks-report/]]></guid>
			<link><![CDATA[https://thecybertrove.com/hollywood-studios-cybersecurity-risks-report/]]></link>
			<title>Hollywood Still Has a Cybersecurity Problem It Can’t Ignore</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:41:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/auraboros-rat-open-c2-panel-keylogging-cookies/]]></guid>
			<link><![CDATA[https://thecybertrove.com/auraboros-rat-open-c2-panel-keylogging-cookies/]]></link>
			<title>Auraboros RAT Exposes Open Spyware Control Panel</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:26:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/claude-ai-firefox-271-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybertrove.com/claude-ai-firefox-271-zero-day-vulnerabilities/]]></link>
			<title>Claude Mythos AI Finds 271 Firefox Zero-Days</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:22:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fake-it-workers-cloud-infiltration-jasper-sleet/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fake-it-workers-cloud-infiltration-jasper-sleet/]]></link>
			<title>North Korean Fake IT Workers Breach Cloud Security</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:03:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/firefox-150-critical-rce-vulnerabilities-update/]]></guid>
			<link><![CDATA[https://thecybertrove.com/firefox-150-critical-rce-vulnerabilities-update/]]></link>
			<title>Firefox 150 Fixes Critical RCE Vulnerabilities: Patch Now</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 19:11:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/lotus-wiper-energy-sector-destructive-cyberattack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/lotus-wiper-energy-sector-destructive-cyberattack/]]></link>
			<title>Lotus Wiper Attack: Destructive Malware Hits Energy Sector</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 16:41:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fintech-mule-accounts-france-money-laundering-cybercrime/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fintech-mule-accounts-france-money-laundering-cybercrime/]]></link>
			<title>Stolen Funds Flow Through French Fintech Mule Accounts</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 16:04:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/atlassian-bamboo-cve-2026-21571-command-injection-ci-cd/]]></guid>
			<link><![CDATA[https://thecybertrove.com/atlassian-bamboo-cve-2026-21571-command-injection-ci-cd/]]></link>
			<title>Critical Atlassian Bamboo Flaw Enables Remote Command Injection</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 15:01:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fake-google-ads-crypto-wallet-seed-phrase-theft/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fake-google-ads-crypto-wallet-seed-phrase-theft/]]></link>
			<title>Fake Google Ads Steal Crypto Seed Phrases and Drain Wallets</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:53:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/spring-authorization-server-oauth-vulnerability-cve-2026-22752/]]></guid>
			<link><![CDATA[https://thecybertrove.com/spring-authorization-server-oauth-vulnerability-cve-2026-22752/]]></link>
			<title>Critical Spring Authorization Server Flaw Exposes OAuth Risk</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:35:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/dindoor-malware-deno-runtime-msi-evade-detection/]]></guid>
			<link><![CDATA[https://thecybertrove.com/dindoor-malware-deno-runtime-msi-evade-detection/]]></link>
			<title>DinDoor Backdoor Uses Deno Runtime to Evade Detection</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 13:49:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/atlassian-bamboo-command-injection-vulnerability-cve-2026-21571/]]></guid>
			<link><![CDATA[https://thecybertrove.com/atlassian-bamboo-command-injection-vulnerability-cve-2026-21571/]]></link>
			<title>Critical Atlassian Bamboo Vulnerability: Your CI/CD Pipeline Could Be at Risk</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 13:26:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sim-farm-as-a-service-global-fraud-proxysmart/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sim-farm-as-a-service-global-fraud-proxysmart/]]></link>
			<title>SIM Farm-as-a-Service Network Exposes Global Fraud Ecosystem</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 13:14:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/npm-supply-chain-attack-canisterworm-malware/]]></guid>
			<link><![CDATA[https://thecybertrove.com/npm-supply-chain-attack-canisterworm-malware/]]></link>
			<title>NPM Supply Chain Attack Spreads CanisterWorm Malware</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 13:02:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/microsoft-signed-binary-lotuslite-dll-sideloading-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/microsoft-signed-binary-lotuslite-dll-sideloading-attack/]]></link>
			<title>Microsoft-Signed Binary Used in LOTUSLITE Espionage Attack</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 11:27:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/crowdstrike-logscale-vulnerability-cve-2026-40050/]]></guid>
			<link><![CDATA[https://thecybertrove.com/crowdstrike-logscale-vulnerability-cve-2026-40050/]]></link>
			<title>CrowdStrike LogScale Vulnerability Enables File Read Attacks</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 08:17:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/anthropic-mythos-breach-ai-security-risk/]]></guid>
			<link><![CDATA[https://thecybertrove.com/anthropic-mythos-breach-ai-security-risk/]]></link>
			<title>Unauthorized Access to AI Cyber Weapon: Mythos Breach Explained</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 06:29:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/dotnet-10-0-7-update-privilege-escalation-fix/]]></guid>
			<link><![CDATA[https://thecybertrove.com/dotnet-10-0-7-update-privilege-escalation-fix/]]></link>
			<title>🚨 Critical .NET Vulnerability: Why You Must Patch to 10.0.7 Now</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 06:20:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/agoda-data-breach-82m-records-booking-com-hack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/agoda-data-breach-82m-records-booking-com-hack/]]></link>
			<title>82M Agoda Records Allegedly Leaked After Booking.com Hack</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 20:13:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/everest-ransomware-frost-citizens-bank-data-breach/]]></guid>
			<link><![CDATA[https://thecybertrove.com/everest-ransomware-frost-citizens-bank-data-breach/]]></link>
			<title>Millions at Risk as Everest Targets Frost &amp; Citizens Bank</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:59:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/apache-syncope-rce-vulnerability-cve-2025-57738/]]></guid>
			<link><![CDATA[https://thecybertrove.com/apache-syncope-rce-vulnerability-cve-2025-57738/]]></link>
			<title>Apache Syncope RCE Vulnerability CVE-2025-57738 Explained</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:06:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sapphire-sleet-macos-fake-zoom-update-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sapphire-sleet-macos-fake-zoom-update-attack/]]></link>
			<title>Sapphire Sleet macOS Attack Uses Social Engineering</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:55:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/ai-ngate-malware-nfc-payment-android/]]></guid>
			<link><![CDATA[https://thecybertrove.com/ai-ngate-malware-nfc-payment-android/]]></link>
			<title>AI-Powered NGate Malware Targets NFC Payment Apps</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:47:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sidewinder-phishing-fake-pdf-zimbra-credential-theft/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sidewinder-phishing-fake-pdf-zimbra-credential-theft/]]></link>
			<title>SideWinder Phishing Uses Fake Chrome PDF &amp; Zimbra Clone</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:37:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/github-ai-prompt-injection-copilot-claude-gemini/]]></guid>
			<link><![CDATA[https://thecybertrove.com/github-ai-prompt-injection-copilot-claude-gemini/]]></link>
			<title>GitHub AI Agents Hit by Prompt Injection via Comments</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:22:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/axios-npm-supply-chain-attack-rat-cisa-warning/]]></guid>
			<link><![CDATA[https://thecybertrove.com/axios-npm-supply-chain-attack-rat-cisa-warning/]]></link>
			<title>Axios npm Supply Chain Attack Impacts Developers</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:04:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sglang-cve-2026-5760-ai-model-rce-exploit/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sglang-cve-2026-5760-ai-model-rce-exploit/]]></link>
			<title>GGUF Model Flaw Enables RCE on SGLang AI Servers</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:46:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/stealtok-malware-tiktok-browser-extensions-spyware/]]></guid>
			<link><![CDATA[https://thecybertrove.com/stealtok-malware-tiktok-browser-extensions-spyware/]]></link>
			<title>StealTok Campaign Turns TikTok Extensions into Spyware</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:34:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/ai-exploitation-collapsing-patch-window-cybersecurity/]]></guid>
			<link><![CDATA[https://thecybertrove.com/ai-exploitation-collapsing-patch-window-cybersecurity/]]></link>
			<title>AI-Powered Exploits Are Collapsing the Patch Window</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:21:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fortigate-vpn-nightmare-eclipse-beige-burrow-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fortigate-vpn-nightmare-eclipse-beige-burrow-attack/]]></link>
			<title>FortiGate VPN Breach Triggers Nightmare-Eclipse Tool Attacks</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:10:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/activemq-cve-2026-34197-exposed-servers/]]></guid>
			<link><![CDATA[https://thecybertrove.com/activemq-cve-2026-34197-exposed-servers/]]></link>
			<title>Apache ActiveMQ Vulnerability Exposes 6,000+ Servers</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:00:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/gh0st-rat-cloverplus-dual-malware-campaign/]]></guid>
			<link><![CDATA[https://thecybertrove.com/gh0st-rat-cloverplus-dual-malware-campaign/]]></link>
			<title>Gh0st RAT &amp; CloverPlus Adware: Dual Malware Campaign Explained</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:43:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/appdomain-hijacking-intel-tool-malware-loader/]]></guid>
			<link><![CDATA[https://thecybertrove.com/appdomain-hijacking-intel-tool-malware-loader/]]></link>
			<title>AppDomain Hijacking Attack Turns Intel Tool Into Malware Loader</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:33:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/anthropic-mcp-vulnerability-rce-ai-security/]]></guid>
			<link><![CDATA[https://thecybertrove.com/anthropic-mcp-vulnerability-rce-ai-security/]]></link>
			<title>Anthropic MCP Vulnerability Enables Critical RCE Attacks</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:23:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/gardyn-smart-garden-iot-vulnerabilities-remote-takeover/]]></guid>
			<link><![CDATA[https://thecybertrove.com/gardyn-smart-garden-iot-vulnerabilities-remote-takeover/]]></link>
			<title>Gardyn Smart Garden Flaws Expose Critical Remote Takeover Risk</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:01:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/sms-phishing-sim-swapping-crypto-theft-explained/]]></guid>
			<link><![CDATA[https://thecybertrove.com/sms-phishing-sim-swapping-crypto-theft-explained/]]></link>
			<title>SMS Phishing &amp; SIM Swapping Attacks: Million-Dollar Crypto Heist</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:49:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/iterm2-rce-escape-sequence-vulnerability/]]></guid>
			<link><![CDATA[https://thecybertrove.com/iterm2-rce-escape-sequence-vulnerability/]]></link>
			<title>iTerm2 RCE Vulnerability: When Text Output Becomes Code Execution</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:28:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/windows-snipping-tool-ntlm-hash-leak-cve-2026-33829/]]></guid>
			<link><![CDATA[https://thecybertrove.com/windows-snipping-tool-ntlm-hash-leak-cve-2026-33829/]]></link>
			<title>Windows Snipping Tool NTLM Hash Leak: Exploit &amp; Defense Guide</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 06:37:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/gentlemen-ransomware-systembc-botnet-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/gentlemen-ransomware-systembc-botnet-attack/]]></link>
			<title>Gentlemen Ransomware Uses SystemBC Botnet for Large-Scale Attacks</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/ai-incident-response-codex-failure/]]></guid>
			<link><![CDATA[https://thecybertrove.com/ai-incident-response-codex-failure/]]></link>
			<title>AI Incident Response Failure: Codex Misleads Active Cyberattack Investigation</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:11:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/bol-webshop-data-leak-400k-records/]]></guid>
			<link><![CDATA[https://thecybertrove.com/bol-webshop-data-leak-400k-records/]]></link>
			<title>Bol Webshop Data Leak Claim: 400K Customer Records Allegedly Exposed</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:01:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/teams-helpdesk-impersonation-quick-assist-attack/]]></guid>
			<link><![CDATA[https://thecybertrove.com/teams-helpdesk-impersonation-quick-assist-attack/]]></link>
			<title>Microsoft Teams Helpdesk Impersonation Attack Explained</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:53:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/lovable-api-bola-flaw-data-exposure/]]></guid>
			<link><![CDATA[https://thecybertrove.com/lovable-api-bola-flaw-data-exposure/]]></link>
			<title>Lovable API BOLA Vulnerability Exposes Thousands of Projects</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:40:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/iran-mois-multi-persona-cyber-campaign/]]></guid>
			<link><![CDATA[https://thecybertrove.com/iran-mois-multi-persona-cyber-campaign/]]></link>
			<title>Iranian MOIS Multi-Persona Cyber Campaign: A New Era of Cyber Warfare</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:32:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/fake-video-meetings-cyberattack-crypto/]]></guid>
			<link><![CDATA[https://thecybertrove.com/fake-video-meetings-cyberattack-crypto/]]></link>
			<title>Fake Video Meetings Cyberattack: UNC1069 Crypto Threat Exposed</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:23:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/maritime-cyber-resilience-singapore-hamburg-mou/]]></guid>
			<link><![CDATA[https://thecybertrove.com/maritime-cyber-resilience-singapore-hamburg-mou/]]></link>
			<title>Global Port Security: Singapore and Germany Unite for Maritime Cyber Resilience</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:09:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/nsa-anthropic-mythos-ai-pentagon-blacklist/]]></guid>
			<link><![CDATA[https://thecybertrove.com/nsa-anthropic-mythos-ai-pentagon-blacklist/]]></link>
			<title>Shocking: NSA Uses &#8220;Dangerous&#8221; Mythos AI Despite Pentagon Ban</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:42:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybertrove.com/windows-11-build-26300-secure-boot-fat32-update/]]></guid>
			<link><![CDATA[https://thecybertrove.com/windows-11-build-26300-secure-boot-fat32-update/]]></link>
			<title>Windows 11 Build 26300: New Secure Boot Monitoring &amp; Storage Fixes</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:28:56 +0000]]></pubDate>
		</item>
				</channel>
</rss>
