<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//zero-day-wire-1.ghost.io/sitemap.xsl"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://zero-day-wire-1.ghost.io/google-attributes-axios-npm-supply-chain-attack-to-north-korean-unc1069-links-backdoor-to-waveshaper-evolution/</loc><lastmod>2026-04-01T08:28:12.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/04/322af044-ca14-4798-bc8a-f3896b78625c.png</image:loc><image:caption>322af044-ca14-4798-bc8a-f3896b78625c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-orders-emergency-patch-for-actively-exploited-citrix-netscaler-flaw-resembling-citrixbleed-cve-2026-3055/</loc><lastmod>2026-03-31T13:11:09.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/3f3d1c7f-c3de-42c5-b0f0-1769fd78d11d.png</image:loc><image:caption>3f3d1c7f-c3de-42c5-b0f0-1769fd78d11d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/axios-supply-chain-attack-delivers-cross-platform-rat-to-millions-after-npm-maintainer-account-hijacked/</loc><lastmod>2026-03-31T12:54:28.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/5b99ede1-2baa-46b8-b004-036e153b51a6.png</image:loc><image:caption>5b99ede1-2baa-46b8-b004-036e153b51a6.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/redline-infostealer-administrator-extradited-to-us-faces-up-to-20-years-for-running-maas-infrastructure/</loc><lastmod>2026-03-26T12:01:19.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/cfda2d35-883a-440a-bdfd-53009a1dd0c6.png</image:loc><image:caption>cfda2d35-883a-440a-bdfd-53009a1dd0c6.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/coruna-ios-exploit-kit-traced-back-to-operation-triangulation-authors-as-attacks-shift-from-espionage-to-mass-exploitation/</loc><lastmod>2026-03-26T11:56:20.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/46931b21-63c6-4b7d-87ea-991cf489e2bf.png</image:loc><image:caption>46931b21-63c6-4b7d-87ea-991cf489e2bf.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/payment-skimmer-abuses-webrtc-channels-to-bypass-csp-and-steal-card-data/</loc><lastmod>2026-03-26T11:31:16.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/991b6b70-1d74-44da-a903-f21f047e1d46.png</image:loc><image:caption>991b6b70-1d74-44da-a903-f21f047e1d46.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/quest-kace-cvss-10-0-authentication-bypass-exploited-to-hijack-admin-accounts-and-target-backup-infrastructure/</loc><lastmod>2026-03-23T10:03:12.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/2fe06dc1-bfab-4f8a-b51b-ec7bb765ef98.png</image:loc><image:caption>2fe06dc1-bfab-4f8a-b51b-ec7bb765ef98.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/trivy-supply-chain-attack-escalates-teampcp-pushes-infostealers-via-docker-hub-deploys-kubernetes-wiper-targeting-iranian-systems/</loc><lastmod>2026-03-23T09:53:56.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/b7302ce1-bb5b-4b38-a624-36be5614c359.png</image:loc><image:caption>b7302ce1-bb5b-4b38-a624-36be5614c359.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/storm-2561-distributes-fake-enterprise-vpn-clients-from-cisco-fortinet-and-ivanti-via-seo-poisoning-to-steal-corporate-credentials/</loc><lastmod>2026-03-14T05:43:07.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/3b0ee0da-fb7e-4422-849c-5c1e7f38cb8a.png</image:loc><image:caption>3b0ee0da-fb7e-4422-849c-5c1e7f38cb8a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-adds-solarwinds-ivanti-and-workspace-one-flaws-to-kev-catalog-solarwinds-linked-to-warlock-ransomware-activity/</loc><lastmod>2026-03-10T10:22:03.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/5bbee309-eafa-4b01-9de0-9279f4e9cde8.png</image:loc><image:caption>5bbee309-eafa-4b01-9de0-9279f4e9cde8.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/blackbasta-linked-actors-deploy-new-a0backdoor-via-microsoft-teams-social-engineering-with-dns-mx-based-c2/</loc><lastmod>2026-03-10T10:10:29.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/76612553-756d-4cd2-a040-65fe0d5f6dfb.png</image:loc><image:caption>76612553-756d-4cd2-a040-65fe0d5f6dfb.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/shinyhunters-claims-100-high-profile-victims-in-salesforce-data-heist-using-modified-mandiant-tool-to-exploit-experience-cloud-misconfigurations/</loc><lastmod>2026-03-10T10:02:07.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/3d4acbb5-684e-4c20-92cf-2d96038cafca.png</image:loc><image:caption>3d4acbb5-684e-4c20-92cf-2d96038cafca.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/clickfix-evolves-to-windows-terminal-execution-bypassing-run-dialog-defenses-to-deploy-lumma-stealer/</loc><lastmod>2026-03-09T14:20:34.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/aae51830-0a76-4b3b-a938-3e981ea421a4.png</image:loc><image:caption>aae51830-0a76-4b3b-a938-3e981ea421a4.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/dutch-intelligence-warns-of-russian-state-campaign-hijacking-signal-and-whatsapp-accounts-of-government-officials-worldwide/</loc><lastmod>2026-03-09T14:07:51.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/071ee31f-92de-4804-8028-d0dbfdcde488.png</image:loc><image:caption>071ee31f-92de-4804-8028-d0dbfdcde488.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/fbi-investigates-breach-of-internal-surveillance-system-containing-wiretap-data-and-investigation-subject-pii/</loc><lastmod>2026-03-09T10:13:35.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/d246f243-c3cf-4ef5-a21a-dd4210c0b9d4.png</image:loc><image:caption>d246f243-c3cf-4ef5-a21a-dd4210c0b9d4.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/chinese-threat-actor-cl-unk-1068-targets-asian-critical-infrastructure-across-seven-sectors-in-years-long-espionage-campaign/</loc><lastmod>2026-03-09T09:55:24.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/680446cc-b173-47ae-aec0-2b2caf82b59e.png</image:loc><image:caption>680446cc-b173-47ae-aec0-2b2caf82b59e.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/qualcomm-zero-day-cve-2026-21385-exploited-in-targeted-android-attacks-possible-spyware-or-nation-state-links/</loc><lastmod>2026-03-04T10:51:35.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/e62c871e-abfe-4915-9065-547866f04f36.png</image:loc><image:caption>e62c871e-abfe-4915-9065-547866f04f36.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/iranian-threat-actors-intensify-ip-camera-exploitation-across-six-countries-to-support-missile-operations-and-battle-damage-assessment/</loc><lastmod>2026-03-04T10:39:30.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/06a6cd03-7694-4976-8bc7-d40539c3615f.png</image:loc><image:caption>06a6cd03-7694-4976-8bc7-d40539c3615f.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/apt41-linked-silver-dragon-targets-governments-across-europe-and-southeast-asia-using-google-drive-c2-and-three-distinct-infection-chains/</loc><lastmod>2026-03-04T10:25:22.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/9d2c1dc1-95ff-4824-891d-e7f731ef5e54.png</image:loc><image:caption>9d2c1dc1-95ff-4824-891d-e7f731ef5e54.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/iranian-drone-strikes-hit-three-aws-data-centers-in-uae-and-bahrain-first-kinetic-attacks-on-major-cloud-infrastructure/</loc><lastmod>2026-03-04T10:25:14.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/9e99935a-8ad5-4644-b37b-aec1d6b95730.png</image:loc><image:caption>9e99935a-8ad5-4644-b37b-aec1d6b95730.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-adds-vmware-aria-operations-rce-flaw-to-kev-catalog-after-reports-of-active-exploitation/</loc><lastmod>2026-03-04T10:13:17.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/02a593b7-637a-4bc6-b1fd-70eb1b82b26c.png</image:loc><image:caption>02a593b7-637a-4bc6-b1fd-70eb1b82b26c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/french-health-ministry-software-supplier-breached-15-8-million-patient-records-stolen-including-doctors-notes-on-hiv-and-sexual-orientation/</loc><lastmod>2026-03-03T11:36:26.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/55d39b80-13b7-4e65-ba7d-8ff262d9518a.png</image:loc><image:caption>55d39b80-13b7-4e65-ba7d-8ff262d9518a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/sloppylemming-targets-pakistan-and-bangladesh-government-and-critical-infrastructure-with-dual-malware-chains-and-112-cloudflare-workers-domains/</loc><lastmod>2026-03-03T10:23:59.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/cf68a42b-afa5-4ba0-8434-8ee4cb1fbcd9.png</image:loc><image:caption>cf68a42b-afa5-4ba0-8434-8ee4cb1fbcd9.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/steaelite-rat-bundles-ransomware-credential-theft-and-live-surveillance-into-single-double-extortion-platform/</loc><lastmod>2026-03-03T09:44:43.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/03/339e9382-9999-40d4-9410-07b351700666.png</image:loc><image:caption>339e9382-9999-40d4-9410-07b351700666.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/scarcruft-deploys-six-malware-families-in-ruby-jumper-campaign-to-breach-air-gapped-networks-via-usb-propagation/</loc><lastmod>2026-02-27T15:46:37.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/e5cc00e2-9795-4b10-9625-4beb43aed204-1.png</image:loc><image:caption>e5cc00e2-9795-4b10-9625-4beb43aed204-1.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/new-threat-actor-uat-10027-deploys-dohdoor-backdoor-against-us-education-and-healthcare-using-dns-over-https-for-stealth-c2/</loc><lastmod>2026-02-27T10:13:53.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/cef670ff-482d-42af-a090-db6a533ed119.png</image:loc><image:caption>cef670ff-482d-42af-a090-db6a533ed119.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/aeternum-c2-botnet-uses-polygon-blockchain-as-sole-command-infrastructure-making-traditional-takedowns-impossible/</loc><lastmod>2026-02-27T10:08:44.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/cdd54afe-dae9-444b-b7de-b968bb4bfa49.png</image:loc><image:caption>cdd54afe-dae9-444b-b7de-b968bb4bfa49.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/us-sanctions-russian-exploit-broker-operation-zero-for-acquiring-stolen-zero-days-from-jailed-l3harris-executive/</loc><lastmod>2026-02-26T15:44:01.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/1cbd74f5-5295-4b89-ab09-e12a6599cf16.png</image:loc><image:caption>1cbd74f5-5295-4b89-ab09-e12a6599cf16.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisco-sd-wan-zero-day-exploited-since-2023-by-sophisticated-threat-actor-cvss-10-0-authentication-bypass-triggers-cisa-emergency-directive/</loc><lastmod>2026-02-26T15:36:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/4c640eb4-b3e7-481c-be5f-8d918b7dfddd.png</image:loc><image:caption>4c640eb4-b3e7-481c-be5f-8d918b7dfddd.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/paypal-confirms-six-month-data-exposure-after-loan-system-code-error-leaked-social-security-numbers/</loc><lastmod>2026-02-23T16:38:42.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/9ca12109-cb49-4080-b766-5bd908715ab5.png</image:loc><image:caption>9ca12109-cb49-4080-b766-5bd908715ab5.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/aws-reports-600-fortigate-firewalls-compromised-in-ai-augmented-campaign-by-russian-speaking-cybercrime-group/</loc><lastmod>2026-02-23T16:03:13.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/2dce87db-a55a-456e-a8b7-fb0738d2f7ca.png</image:loc><image:caption>2dce87db-a55a-456e-a8b7-fb0738d2f7ca.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/clickfix-campaign-compromises-legitimate-sites-to-deploy-mimicrat-a-custom-c-rat-with-22-post-exploitation-commands/</loc><lastmod>2026-02-20T14:01:34.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/e8615148-57ac-4704-8855-71a677df0c48.png</image:loc><image:caption>e8615148-57ac-4704-8855-71a677df0c48.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/shinyhunters-linked-to-device-code-vishing-attacks-targeting-microsoft-entra-accounts-via-oauth-2-0-abuse/</loc><lastmod>2026-02-19T14:07:19.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/131207e9-eb6f-43ba-b826-53f3ee940091.png</image:loc><image:caption>131207e9-eb6f-43ba-b826-53f3ee940091.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/massiv-android-banking-trojan-disguised-as-iptv-apps-enables-full-device-takeover-for-financial-fraud/</loc><lastmod>2026-02-19T11:29:22.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/753f012f-feac-4695-a734-92d32febc1c8.png</image:loc><image:caption>753f012f-feac-4695-a734-92d32febc1c8.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/crescentharvest-campaign-deploys-rat-malware-against-iran-protest-supporters-using-dll-sideloading-via-signed-google-binary/</loc><lastmod>2026-02-19T09:49:41.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/f0e89d06-d432-430c-8e7e-e0079c08cea0.png</image:loc><image:caption>f0e89d06-d432-430c-8e7e-e0079c08cea0.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/underground-telegram-channels-weaponize-smartermail-exploits-within-days-of-disclosure-enabling-ransomware-campaigns/</loc><lastmod>2026-02-19T09:35:08.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/e0acfe6e-f67e-4a98-ab95-915fd06112ad.png</image:loc><image:caption>e0acfe6e-f67e-4a98-ab95-915fd06112ad.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/smartloader-campaign-trojanizes-oura-mcp-server-with-fake-github-network-to-deploy-stealc-infostealer/</loc><lastmod>2026-02-17T20:48:55.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/ed65238a-e939-4db1-bd7b-367df24de174.png</image:loc><image:caption>ed65238a-e939-4db1-bd7b-367df24de174.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/apt-unc6201-exploited-dell-zero-day-since-mid-2024-deploying-novel-grimbolt-backdoor-and-esxi-ghost-nics/</loc><lastmod>2026-02-17T20:46:03.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/4cee7936-7e71-4900-8aee-3f8140d98822.png</image:loc><image:caption>4cee7936-7e71-4900-8aee-3f8140d98822.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/kaspersky-uncovers-keenadu-backdoor-pre-installed-in-android-firmware-across-multiple-device-brands/</loc><lastmod>2026-02-17T15:19:28.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/f723c1ef-e867-4f3f-8911-b049dabc2352.png</image:loc><image:caption>f723c1ef-e867-4f3f-8911-b049dabc2352.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/check-point-demonstrates-ai-chatbots-as-covert-c2-channels-grok-and-copilot-exploited-without-authentication/</loc><lastmod>2026-02-17T15:08:53.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/c11a81eb-e1b6-4316-85f9-9cfcf867650d.png</image:loc><image:caption>c11a81eb-e1b6-4316-85f9-9cfcf867650d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/microsoft-exposes-ai-recommendation-poisoning-businesses-secretly-manipulating-chatbot-memory-via-summarize-buttons/</loc><lastmod>2026-02-17T10:29:35.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/db375f0f-83f9-4ec8-b1b0-5b0a0cb186cd.png</image:loc><image:caption>db375f0f-83f9-4ec8-b1b0-5b0a0cb186cd.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/gs7-threat-group-targets-fortune-500-financial-institutions-with-near-perfect-brand-impersonation-in-operation-doppelbrand/</loc><lastmod>2026-02-16T21:20:55.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/653dca0a-92f5-495b-a45d-c08f47c6518a.png</image:loc><image:caption>653dca0a-92f5-495b-a45d-c08f47c6518a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/infostealers-begin-targeting-openclaw-ai-agent-configuration-files-stealing-gateway-tokens-and-cryptographic-keys/</loc><lastmod>2026-02-16T21:00:28.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/164f3913-ef50-4253-8fdd-d85f754e921b.png</image:loc><image:caption>164f3913-ef50-4253-8fdd-d85f754e921b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/former-l3harris-cyber-executive-sold-eight-zero-day-exploit-kits-to-russian-broker-doj-reveals/</loc><lastmod>2026-02-16T17:08:42.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/e3c8963a-31ca-498d-aeb2-e4bca4f575d5.png</image:loc><image:caption>e3c8963a-31ca-498d-aeb2-e4bca4f575d5.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/hijacked-google-ads-and-fake-claude-ai-guides-used-to-deliver-macsync-infostealer-through-clickfix-campaign/</loc><lastmod>2026-02-16T17:01:10.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/469bb16c-507a-451f-99a2-cda77f405c34.png</image:loc><image:caption>469bb16c-507a-451f-99a2-cda77f405c34.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/shinyhunters-claims-600-000-customer-records-from-canada-goose-as-third-party-payment-processor-breach/</loc><lastmod>2026-02-16T16:48:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/17dda9a7-bea4-4d51-b804-1901041783e3.png</image:loc><image:caption>17dda9a7-bea4-4d51-b804-1901041783e3.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/google-patches-first-chrome-zero-day-of-2026-after-active-exploitation-of-css-use-after-free-flaw-cve-2026-2441/</loc><lastmod>2026-02-16T16:41:46.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/16727977-91a4-48f1-acc2-7ff4871f3a28.png</image:loc><image:caption>16727977-91a4-48f1-acc2-7ff4871f3a28.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/beyondtrust-cvss-9-9-pre-auth-rce-now-exploited-in-the-wild-as-attackers-target-remote-access-infrastructure/</loc><lastmod>2026-02-13T15:10:42.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/340b603f-cc9a-4d90-b20b-59d9cdf26a85.png</image:loc><image:caption>340b603f-cc9a-4d90-b20b-59d9cdf26a85.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/qilin-ransomware-gang-breaches-romanias-national-oil-pipeline-operator-conpet-claims-1tb-data-theft/</loc><lastmod>2026-02-12T19:51:52.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/864de7d7-7772-4f10-9260-0d04b6341128.png</image:loc><image:caption>864de7d7-7772-4f10-9260-0d04b6341128.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/lazarus-group-poisons-npm-and-pypi-with-fake-recruitment-campaign-deploying-token-based-rat/</loc><lastmod>2026-02-12T18:31:21.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/70848c10-bee0-4ef3-a7df-f56734bf5042.png</image:loc><image:caption>70848c10-bee0-4ef3-a7df-f56734bf5042.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/30-fake-ai-chrome-extensions-with-300-000-installs-caught-stealing-credentials-gmail-data-and-audio/</loc><lastmod>2026-02-12T15:53:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/39756c4a-c8d0-423f-9fb0-76dff7ca779f.png</image:loc><image:caption>39756c4a-c8d0-423f-9fb0-76dff7ca779f.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/comcast-agrees-to-117-5m-settlement-over-citrix-bleed-breach-that-exposed-31-6-million-customers/</loc><lastmod>2026-02-12T13:10:06.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/e98e2f1b-710f-4a34-beeb-83840f36b48b.png</image:loc><image:caption>e98e2f1b-710f-4a34-beeb-83840f36b48b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/chinas-apt31-used-gemini-ai-and-hexstrike-to-automate-vulnerability-analysis-against-us-targets/</loc><lastmod>2026-02-12T10:27:57.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/07f817ca-5c5a-43da-b7e5-87473409f1a6.png</image:loc><image:caption>07f817ca-5c5a-43da-b7e5-87473409f1a6.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/single-bulletproof-hosting-ip-behind-83-of-ivanti-epmm-exploitation-as-sleeper-shells-target-mdm-infrastructure/</loc><lastmod>2026-02-12T10:05:51.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/edd34fd6-fddb-4d58-81d6-8a0103ef4fcb.png</image:loc><image:caption>edd34fd6-fddb-4d58-81d6-8a0103ef4fcb.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/first-malicious-outlook-add-in-discovered-in-the-wild-after-abandoned-domain-hijack-steals-4-000-credentials/</loc><lastmod>2026-02-12T08:13:37.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/c325e420-559f-46ae-a20b-c4a130340e87.png</image:loc><image:caption>c325e420-559f-46ae-a20b-c4a130340e87.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/apple-patches-first-zero-day-of-2026-after-google-tag-discovers-exploitation-in-targeted-attacks/</loc><lastmod>2026-02-12T07:37:57.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/626e35b8-40b0-4205-823e-c9d1b457f0ff.png</image:loc><image:caption>626e35b8-40b0-4205-823e-c9d1b457f0ff.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/crazy-ransomware-operator-weaponizes-employee-monitoring-software-for-stealth-persistence/</loc><lastmod>2026-02-11T20:48:13.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/971db87c-a193-4d2b-88c8-a48bfe8a5dcc.png</image:loc><image:caption>971db87c-a193-4d2b-88c8-a48bfe8a5dcc.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/dutch-police-arrest-third-suspect-behind-jokerotp-phishing-platform-that-caused-10m-in-losses/</loc><lastmod>2026-02-11T20:18:18.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/1da7f7ef-bbd4-4917-afc2-801dcf4d85a3.png</image:loc><image:caption>1da7f7ef-bbd4-4917-afc2-801dcf4d85a3.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/north-korean-unc1069-deploys-ai-generated-deepfakes-and-seven-malware-families-to-target-crypto-sector/</loc><lastmod>2026-02-11T17:42:38.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/a8328235-6dc6-48b8-862d-4eeac0eae207.png</image:loc><image:caption>a8328235-6dc6-48b8-862d-4eeac0eae207.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/lummastealer-rebounds-with-castleloader-campaigns-as-clickfix-infections-surge-globally/</loc><lastmod>2026-02-11T17:30:28.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/b7a01bbc-5844-4fa4-a977-62a138a6e127.png</image:loc><image:caption>b7a01bbc-5844-4fa4-a977-62a138a6e127.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/kimwolf-iot-botnet-disrupts-i2p-anonymity-network-in-massive-sybil-attack/</loc><lastmod>2026-02-11T17:19:53.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/931d046e-a526-4612-b4a8-cb28c520ca96.png</image:loc><image:caption>931d046e-a526-4612-b4a8-cb28c520ca96.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/microsoft-february-2026-patch-tuesday-fixes-six-actively-exploited-zero-days-across-windows-office-and-remote-desktop/</loc><lastmod>2026-02-11T17:02:35.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/83264401-3f3c-40ba-87b6-e6e09f834f3b.png</image:loc><image:caption>83264401-3f3c-40ba-87b6-e6e09f834f3b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/fortinet-patches-two-critical-flaws-forticlientems-sqli-and-actively-exploited-forticloud-sso-bypass/</loc><lastmod>2026-02-10T16:54:13.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/136e2f5e-88e6-4852-900d-6dfa02793de6.png</image:loc><image:caption>136e2f5e-88e6-4852-900d-6dfa02793de6.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/beyondtrust-patches-critical-unauthenticated-rce-in-remote-support-and-privileged-remote-access-cve-2026-1731/</loc><lastmod>2026-02-09T20:32:48.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/b31a5fdf-2890-4fea-b9cb-8db9a4b60c8f.png</image:loc><image:caption>b31a5fdf-2890-4fea-b9cb-8db9a4b60c8f.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/chinese-apt-unc3886-targeted-all-four-singapore-telecoms-in-espionage-campaign/</loc><lastmod>2026-02-09T20:22:02.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/521285a9-d702-4eaf-839e-8a6209f645fb.png</image:loc><image:caption>521285a9-d702-4eaf-839e-8a6209f645fb.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/european-commission-mobile-infrastructure-breached-through-ivanti-epmm-vulnerabilities/</loc><lastmod>2026-02-09T20:14:37.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/e5e993ff-e945-44f4-82e2-e5ff58096646.png</image:loc><image:caption>e5e993ff-e945-44f4-82e2-e5ff58096646.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/hackers-exploit-critical-react-native-metro-flaw-to-compromise-developer-systems-cve-2025-11953/</loc><lastmod>2026-02-08T13:45:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/dc2cd04d-4e79-403c-8c3c-7196a10a776c.png</image:loc><image:caption>dc2cd04d-4e79-403c-8c3c-7196a10a776c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/rublevka-team-russian-crypto-drainer-operation-steals-10-million-through-affiliate-network/</loc><lastmod>2026-02-05T18:42:27.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/28ce53f0-bb96-4ce5-b276-ac8315907a82.png</image:loc><image:caption>28ce53f0-bb96-4ce5-b276-ac8315907a82.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisco-meeting-management-vulnerability-allows-authenticated-attackers-to-gain-root-access/</loc><lastmod>2026-02-05T18:35:03.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/ac941429-4d46-4613-b686-2c920fbf5707.png</image:loc><image:caption>ac941429-4d46-4613-b686-2c920fbf5707.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/microsoft-integrates-sysmon-directly-into-windows-11-for-native-threat-detection/</loc><lastmod>2026-02-05T18:23:17.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/fe3c5d88-36cc-4a1f-85dc-ea617aca7660.png</image:loc><image:caption>fe3c5d88-36cc-4a1f-85dc-ea617aca7660.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-vllm-vulnerability-allows-remote-code-execution-via-malicious-video-files/</loc><lastmod>2026-02-05T18:17:24.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/8363c30d-db2d-4abd-9341-b528853471d2.png</image:loc><image:caption>8363c30d-db2d-4abd-9341-b528853471d2.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/threat-actors-exploit-15-year-old-encase-driver-to-kill-edr-processes-in-ransomware-precursor-attack/</loc><lastmod>2026-02-05T18:07:24.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/16e573c2-c6ed-4172-b289-954941c87a07.png</image:loc><image:caption>16e573c2-c6ed-4172-b289-954941c87a07.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/shinyhunters-claims-second-leader-arrested-as-groups-x-account-suspended/</loc><lastmod>2026-02-05T18:00:56.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/0c27942d-f927-4736-ac2a-98a92f41306b.png</image:loc><image:caption>0c27942d-f927-4736-ac2a-98a92f41306b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/unit-42-exposes-tgr-sta-1030-state-aligned-espionage-group-compromised-37-countries-in-one-year/</loc><lastmod>2026-02-05T17:19:33.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/4063b337-41ce-4ab7-8448-04c0272df660.png</image:loc><image:caption>4063b337-41ce-4ab7-8448-04c0272df660.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/lockbit-5-0-deploys-cross-platform-ransomware-targeting-windows-linux-and-esxi-simultaneously/</loc><lastmod>2026-02-05T14:24:31.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/0e96ed4f-350c-4cb0-b1f5-6cf96f026aed.png</image:loc><image:caption>0e96ed4f-350c-4cb0-b1f5-6cf96f026aed.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/shadowsyndicate-linked-to-20-c2-servers-after-ssh-fingerprint-rotation-technique-exposed/</loc><lastmod>2026-02-05T14:10:18.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/ddb16e28-4455-4b86-b1c7-fd664ff41970.png</image:loc><image:caption>ddb16e28-4455-4b86-b1c7-fd664ff41970.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-silently-updated-ransomware-intelligence-on-59-vulnerabilities-in-2025-without-notifying-defenders/</loc><lastmod>2026-02-05T12:09:19.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/2dd00088-df31-4006-9c52-3c25d80b9602.png</image:loc><image:caption>2dd00088-df31-4006-9c52-3c25d80b9602.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/interlock-ransomware-deploys-zero-day-anti-cheat-driver-exploit-to-kill-edr-processes/</loc><lastmod>2026-02-04T21:56:23.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/18a84a01-f26f-4d0c-8b3a-362816f99e5e.png</image:loc><image:caption>18a84a01-f26f-4d0c-8b3a-362816f99e5e.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/ai-assisted-cloud-intrusion-achieves-aws-admin-access-in-8-minutes/</loc><lastmod>2026-02-04T14:49:18.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/b49e7114-021a-44a9-bde8-d8d03f05233c.png</image:loc><image:caption>b49e7114-021a-44a9-bde8-d8d03f05233c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/step-finance-loses-40m-in-crypto-after-executive-devices-compromised/</loc><lastmod>2026-02-04T14:49:10.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/a6106db1-f8fa-497c-941c-b98ff53aa640.png</image:loc><image:caption>a6106db1-f8fa-497c-941c-b98ff53aa640.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/django-patches-three-high-severity-sql-injection-flaws-across-all-supported-versions/</loc><lastmod>2026-02-04T14:49:03.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/5e4adc7a-a041-451e-b803-13fa5811cada.png</image:loc><image:caption>5e4adc7a-a041-451e-b803-13fa5811cada.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/bluenoroff-weaponizes-microsoft-teams-calls-to-steal-macos-credentials-in-real-time/</loc><lastmod>2026-02-03T18:34:28.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/8740f8fb-ead9-44d5-b205-27a3cbc237d8.png</image:loc><image:caption>8740f8fb-ead9-44d5-b205-27a3cbc237d8.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-1-click-rce-in-openclaw-gives-attackers-full-control-of-developer-machines-cve-2026-25253/</loc><lastmod>2026-02-03T18:03:18.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/05942a62-c8b3-4a6d-8bed-eaa4a4cde01d.png</image:loc><image:caption>05942a62-c8b3-4a6d-8bed-eaa4a4cde01d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/inside-the-lazarus-groups-contagious-interview-machine-857-developers-compromised-241-000-credentials-stolen/</loc><lastmod>2026-02-03T17:18:33.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/3c5773ba-92cf-4ee8-86ea-9fc344063a8c.png</image:loc><image:caption>3c5773ba-92cf-4ee8-86ea-9fc344063a8c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/apt28-weaponizes-microsoft-office-zero-day-within-24-hours-targets-ukraine-and-eu-with-covenant-backdoor/</loc><lastmod>2026-02-02T23:23:14.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/5cc8ad02-01e3-4631-b660-fc978b4f6824.png</image:loc><image:caption>5cc8ad02-01e3-4631-b660-fc978b4f6824.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/chinese-apt-lotus-blossom-hijacked-notepad-updates-for-six-months-deploying-new-chrysalis-backdoor/</loc><lastmod>2026-02-02T23:10:44.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/4a94dd57-da31-4cf4-9188-5033d60c8e18-1.png</image:loc><image:caption>4a94dd57-da31-4cf4-9188-5033d60c8e18-1.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/shinyhunters-escalates-saas-data-theft-with-vishing-and-mfa-manipulation/</loc><lastmod>2026-02-02T18:16:28.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/02/000d9612-d1c9-4b48-906f-6addb944618c.png</image:loc><image:caption>000d9612-d1c9-4b48-906f-6addb944618c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/ghostchat-spyware-uses-romance-scams-and-whatsapp-hijacking-to-target-pakistani-android-users/</loc><lastmod>2026-01-31T16:08:48.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/96263c7c-5711-4d3a-b965-86a32b6d7c9d.png</image:loc><image:caption>96263c7c-5711-4d3a-b965-86a32b6d7c9d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/shadowhs-fileless-linux-framework-executes-entirely-from-memory-for-long-term-intrusion-operations/</loc><lastmod>2026-01-31T15:41:40.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/b566556e-b318-4bae-8f9a-2215f390ce6b.png</image:loc><image:caption>b566556e-b318-4bae-8f9a-2215f390ce6b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/iranian-apt42-deploys-tamecat-backdoor-against-defense-and-government-officials/</loc><lastmod>2026-01-31T15:27:18.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/0906f1ec-6310-4ce1-a7e8-fb61dde11267.png</image:loc><image:caption>0906f1ec-6310-4ce1-a7e8-fb61dde11267.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/operation-bizarre-bazaar-first-llmjacking-marketplace-monetizes-stolen-ai-infrastructure-access/</loc><lastmod>2026-01-31T15:15:22.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/881dc6f6-d59a-4926-ba1d-8811051f7129.png</image:loc><image:caption>881dc6f6-d59a-4926-ba1d-8811051f7129.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-kyverno-vulnerability-allows-cluster-admin-takeover-via-policy-abuse-cve-2026-22039/</loc><lastmod>2026-01-31T03:17:27.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/19165c68-91fd-42a8-8cdb-2b02189a5f55.png</image:loc><image:caption>19165c68-91fd-42a8-8cdb-2b02189a5f55.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-adds-actively-exploited-ivanti-epmm-vulnerability-to-kev-catalog-cve-2026-1281/</loc><lastmod>2026-01-29T21:33:13.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/87f164aa-bf4b-490e-ad14-a1d166d12ee1.png</image:loc><image:caption>87f164aa-bf4b-490e-ad14-a1d166d12ee1.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/north-koreas-labyrinth-chollima-splinters-into-three-specialized-cyber-units/</loc><lastmod>2026-01-29T21:16:54.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/37c4c719-e91e-48a5-8fbd-cf8ac5b32dfb.png</image:loc><image:caption>37c4c719-e91e-48a5-8fbd-cf8ac5b32dfb.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/google-disrupts-ipidea-one-of-the-worlds-largest-residential-proxy-networks-used-by-550-threat-groups/</loc><lastmod>2026-01-29T21:05:22.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/3bfd3274-68cc-4ec3-89a9-f740e2036255.png</image:loc><image:caption>3bfd3274-68cc-4ec3-89a9-f740e2036255.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/solarwinds-web-help-desk-hit-with-six-critical-vulnerabilities-including-multiple-rce-flaws/</loc><lastmod>2026-01-29T18:03:35.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/6c60cfa1-599f-4fa2-a65e-a2d72474e33d.png</image:loc><image:caption>6c60cfa1-599f-4fa2-a65e-a2d72474e33d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/fake-clawdbot-vs-code-extension-deploys-screenconnect-rat-on-developer-machines/</loc><lastmod>2026-01-29T18:00:38.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/d1b238f9-22e2-4df1-8213-b3c4488b94c7.png</image:loc><image:caption>d1b238f9-22e2-4df1-8213-b3c4488b94c7.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-sandboxjs-vulnerability-allows-complete-sandbox-escape-and-remote-code-execution-cve-2026-23830/</loc><lastmod>2026-01-29T17:31:09.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/a30a779e-b7da-4c27-ac32-25a54d3a896e.png</image:loc><image:caption>a30a779e-b7da-4c27-ac32-25a54d3a896e.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/escan-antivirus-compromised-in-supply-chain-attack-pushes-malware-through-legitimate-updates/</loc><lastmod>2026-01-29T17:28:23.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/ebc8fcbb-bf2f-45d4-972c-52752d606cfd.png</image:loc><image:caption>ebc8fcbb-bf2f-45d4-972c-52752d606cfd.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/initial-access-broker-ta584-deploys-high-speed-phishing-campaigns-with-clickfix-social-engineering-and-new-tsundere-bot-backdoor/</loc><lastmod>2026-01-28T22:48:23.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/bb31abde-bbe9-419d-8c59-66a1eb42b09d.png</image:loc><image:caption>bb31abde-bbe9-419d-8c59-66a1eb42b09d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/threat-actors-exploit-react2shell-vulnerability-to-deploy-cryptocurrency-miners-and-botnets-worldwide/</loc><lastmod>2026-01-28T21:45:45.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/91cdd92f-056f-46f4-a7eb-3c1444933469.png</image:loc><image:caption>91cdd92f-056f-46f4-a7eb-3c1444933469.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/openssl-patches-high-severity-stack-buffer-overflow-and-eleven-additional-vulnerabilities/</loc><lastmod>2026-01-28T16:00:56.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/0b570057-6913-49d9-b4f2-b25cddfe2169.png</image:loc><image:caption>0b570057-6913-49d9-b4f2-b25cddfe2169.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-n8n-workflow-automation-vulnerability-allows-remote-code-execution-cve-2026-1470/</loc><lastmod>2026-01-28T14:23:22.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/bb1801d8-e070-43a1-9aa2-a77dbd7eda21.png</image:loc><image:caption>bb1801d8-e070-43a1-9aa2-a77dbd7eda21.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/sicarii-ransomware-contains-fatal-coding-flaw-that-makes-decryption-impossible-even-after-payment/</loc><lastmod>2026-01-28T14:22:48.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/aee16b92-4d8e-4d74-8846-689f4fd97b1c.png</image:loc><image:caption>aee16b92-4d8e-4d74-8846-689f4fd97b1c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-acting-director-uploaded-sensitive-government-documents-to-public-chatgpt-triggering-security-warnings/</loc><lastmod>2026-01-28T14:03:03.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/3e701813-e391-451e-8619-752965b419ae.png</image:loc><image:caption>3e701813-e391-451e-8619-752965b419ae.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/vietnamese-threat-actor-uses-ai-to-develop-purerat-malware-in-job-themed-phishing-campaign/</loc><lastmod>2026-01-28T12:41:16.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/c369954d-a247-4172-90f6-4c4ce3d0be52.png</image:loc><image:caption>c369954d-a247-4172-90f6-4c4ce3d0be52.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/outlook-add-in-attack-enables-silent-email-exfiltration-with-zero-forensic-traces/</loc><lastmod>2026-01-28T11:20:22.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/095664cc-ae0f-42ff-ad08-6d0b15af94c4.png</image:loc><image:caption>095664cc-ae0f-42ff-ad08-6d0b15af94c4.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-fortinet-authentication-bypass-allows-access-to-other-customers-devices-cve-2026-24858/</loc><lastmod>2026-01-28T10:55:17.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/4cc9de1d-05f1-4183-80cf-1dd9c0caba44.png</image:loc><image:caption>4cc9de1d-05f1-4183-80cf-1dd9c0caba44.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/threat-actor-claims-massive-leak-of-36-million-venezuelan-citizen-records-including-national-identity-data/</loc><lastmod>2026-01-27T22:01:18.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/ed94a5a2-2c02-4035-914a-18539ded1263.png</image:loc><image:caption>ed94a5a2-2c02-4035-914a-18539ded1263.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-appsmith-vulnerability-enables-account-takeover-through-origin-header-manipulation-cve-2026-22794/</loc><lastmod>2026-01-27T21:12:02.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/315f45cd-4475-4712-a2b5-5aac085e6c94.png</image:loc><image:caption>315f45cd-4475-4712-a2b5-5aac085e6c94.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/salt-typhoon-hacked-downing-street-mobile-phones-for-years-exposing-senior-uk-government-communications/</loc><lastmod>2026-01-27T20:31:00.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/8f272ba7-7beb-4766-9e0a-1d62e9dea8f5.png</image:loc><image:caption>8f272ba7-7beb-4766-9e0a-1d62e9dea8f5.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/china-aligned-apt-groups-deploy-peckbirdy-jscript-framework-for-fileless-attacks-on-government-targets/</loc><lastmod>2026-01-27T18:58:23.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/04dff712-4879-4a97-baa3-214992b9577c.png</image:loc><image:caption>04dff712-4879-4a97-baa3-214992b9577c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/malicious-npm-package-g_wagon-steals-browser-credentials-and-100-cryptocurrency-wallets/</loc><lastmod>2026-01-27T18:39:51.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/cfea3c6c-fc2f-4756-8ffa-a993b979cb2d.png</image:loc><image:caption>cfea3c6c-fc2f-4756-8ffa-a993b979cb2d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/mustang-panda-upgrades-coolclient-backdoor-with-clipboard-monitoring-and-credential-theft-capabilities/</loc><lastmod>2026-01-27T15:15:36.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/4df21861-f648-4a21-9066-f1f90a487ac4.png</image:loc><image:caption>4df21861-f648-4a21-9066-f1f90a487ac4.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-vm2-sandbox-escape-vulnerability-allows-arbitrary-code-execution-on-host-systems-cve-2026-22709/</loc><lastmod>2026-01-27T14:56:30.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/9291a27d-acce-492b-8914-675ba5d5c2ee.png</image:loc><image:caption>9291a27d-acce-492b-8914-675ba5d5c2ee.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/worldleaks-ransomware-group-claims-attack-on-nike-threatens-saturday-data-leak/</loc><lastmod>2026-01-27T12:39:25.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/42aa7505-aff1-4bbf-888c-7f6242bfb262.png</image:loc><image:caption>42aa7505-aff1-4bbf-888c-7f6242bfb262.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/fake-notepad-and-7-zip-websites-distribute-weaponized-rmm-tools-to-deploy-backdoor-malware/</loc><lastmod>2026-01-27T11:28:05.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/3c1b7dde-513b-410a-8857-a536e2f0c014.png</image:loc><image:caption>3c1b7dde-513b-410a-8857-a536e2f0c014.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/pakistan-linked-apt-targets-indian-government-with-new-golang-malware-using-github-for-command-and-control/</loc><lastmod>2026-01-27T11:04:09.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/be76c314-edd8-48bb-84bb-be6cdaf27b1d.png</image:loc><image:caption>be76c314-edd8-48bb-84bb-be6cdaf27b1d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-adds-four-vulnerabilities-to-kev-catalog-including-critical-smartermail-authentication-bypass/</loc><lastmod>2026-01-26T21:30:52.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/fd4e67f5-85e3-493e-86de-7db5cdd8143d.png</image:loc><image:caption>fd4e67f5-85e3-493e-86de-7db5cdd8143d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/microsoft-office-zero-day-under-active-exploitation-bypasses-ole-security-mitigations-cve-2026-21509/</loc><lastmod>2026-01-26T20:33:17.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/5cdf2757-21eb-4bdc-b10c-8d90948559ea.png</image:loc><image:caption>5cdf2757-21eb-4bdc-b10c-8d90948559ea.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/russian-malware-toolkit-guarantees-chrome-web-store-approval-for-6-000/</loc><lastmod>2026-01-26T17:30:05.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/7083ecb2-9163-40c6-a5c0-220a02038c40.png</image:loc><image:caption>7083ecb2-9163-40c6-a5c0-220a02038c40.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/winrar-vulnerability-exploited-to-deploy-fileless-quasar-rat-without-user-consent/</loc><lastmod>2026-01-26T16:32:45.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/4e8f1e88-7f52-432c-a507-42e178f6be90.png</image:loc><image:caption>4e8f1e88-7f52-432c-a507-42e178f6be90.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/bank-of-england-finds-financial-firms-failing-basic-cybersecurity-controls/</loc><lastmod>2026-01-26T16:24:03.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/f3c69cc3-8b25-438d-84e2-d763650f7eea.png</image:loc><image:caption>f3c69cc3-8b25-438d-84e2-d763650f7eea.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/clop-ransomware-group-claims-43-victims-in-massive-24-hour-breach-wave/</loc><lastmod>2026-01-26T16:11:26.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/0f87beb4-68cb-490e-ab23-2605c07d9390.png</image:loc><image:caption>0f87beb4-68cb-490e-ab23-2605c07d9390.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/sandworm-deployed-new-dynowiper-malware-against-poland-energy-grid-in-failed-attack/</loc><lastmod>2026-01-26T14:09:25.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/44ae0c2d-b3eb-411b-87fc-75202339d395.png</image:loc><image:caption>44ae0c2d-b3eb-411b-87fc-75202339d395.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/instagram-vulnerability-exposed-private-photos-without-authentication-meta-silently-patched-and-denied-report/</loc><lastmod>2026-01-26T11:44:42.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/17d8b909-d5b0-49e1-a16f-13e515ddc7f5.png</image:loc><image:caption>17d8b909-d5b0-49e1-a16f-13e515ddc7f5.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/macsync-infostealer-targets-macos-users-with-fake-terminal-commands-and-trojanized-wallet-apps/</loc><lastmod>2026-01-26T10:22:24.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/14769515-6800-4d0d-b0b8-55e82dbe003c.png</image:loc><image:caption>14769515-6800-4d0d-b0b8-55e82dbe003c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/researchers-uncover-kazakrat-campaign-targeting-central-asian-government-entities/</loc><lastmod>2026-01-25T22:22:43.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/80d10418-dfc8-41c4-b452-ac933d091398.png</image:loc><image:caption>80d10418-dfc8-41c4-b452-ac933d091398.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-adds-critical-vmware-vcenter-rce-flaw-to-exploited-vulnerabilities-list/</loc><lastmod>2026-01-25T22:00:51.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/c424cbf5-ba7b-43b7-bf87-8c20e067da10.png</image:loc><image:caption>c424cbf5-ba7b-43b7-bf87-8c20e067da10.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/fedex-database-access-allegedly-sold-on-cybercrime-forum-via-insider/</loc><lastmod>2026-01-25T19:27:38.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/a586247b-39b8-476e-8b13-8089a7931bc5.png</image:loc><image:caption>a586247b-39b8-476e-8b13-8089a7931bc5.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/multi-stage-campaign-delivers-amnesia-rat-and-ransomware-using-defendnot-to-disable-microsoft-defender/</loc><lastmod>2026-01-25T12:18:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/7907ec3d-5f57-4573-8824-18866ceb29a1.png</image:loc><image:caption>7907ec3d-5f57-4573-8824-18866ceb29a1.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/attackers-installed-malware-on-atms-across-the-southeastern-united-states-forcing-machines-to-dispense-all-available-cash-in-operation-linked-to-54-person-indictment-and-alleged-tren-de/</loc><lastmod>2026-01-25T00:17:50.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/fe5b7f91-7e47-4275-a29f-6870dbd85155.png</image:loc><image:caption>fe5b7f91-7e47-4275-a29f-6870dbd85155.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/anubis-ransomware-introduces-wiper-mode-that-destroys-data-even-after-payment/</loc><lastmod>2026-01-24T21:44:09.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/6e36ac9e-7f6b-4f27-b66a-9bd60defd39a.png</image:loc><image:caption>6e36ac9e-7f6b-4f27-b66a-9bd60defd39a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/affirm-data-breach-allegedly-exposes-26-7-million-user-records-on-dark-web/</loc><lastmod>2026-01-24T17:02:24.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/50fdb0ed-b083-4db4-a16b-aabbf9e2da04.png</image:loc><image:caption>50fdb0ed-b083-4db4-a16b-aabbf9e2da04.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-adds-four-actively-exploited-vulnerabilities-to-kev-catalog-including-vite-and-zimbra-flaws/</loc><lastmod>2026-01-24T14:08:37.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/41cf6317-7139-47b1-9eac-4c70dffae0ff.png</image:loc><image:caption>41cf6317-7139-47b1-9eac-4c70dffae0ff.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/vishing-toolkits-enable-real-time-mfa-bypass-through-synchronized-phone-and-browser-attacks/</loc><lastmod>2026-01-24T13:33:24.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/803958a7-b0f3-4a04-bc3d-8dd1b6750e8a.png</image:loc><image:caption>803958a7-b0f3-4a04-bc3d-8dd1b6750e8a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/pdfsider-backdoor-deployed-against-fortune-100-company-using-dll-side-loading/</loc><lastmod>2026-01-24T01:19:46.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/673b519f-18b6-475f-afcf-7fbc7fabe605.png</image:loc><image:caption>673b519f-18b6-475f-afcf-7fbc7fabe605.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/emeditor-supply-chain-attack-trusted-installer-weaponized-to-deploy-multi-stage-malware/</loc><lastmod>2026-01-24T00:45:47.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/f8ea18fe-5232-49a9-b9a9-2bad26fca19a.png</image:loc><image:caption>f8ea18fe-5232-49a9-b9a9-2bad26fca19a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-wordpress-lms-plugin-flaw-under-active-exploitation-enables-full-site-takeover/</loc><lastmod>2026-01-23T23:40:02.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/7fa2d19a-e136-4b15-a20a-3011c152555b.png</image:loc><image:caption>7fa2d19a-e136-4b15-a20a-3011c152555b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/nova-ransomware-group-claims-attack-on-kpmg-threatens-to-leak-500gb-of-data/</loc><lastmod>2026-01-23T18:05:21.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/7411825c-2187-45df-8a91-cd394a259fb3.png</image:loc><image:caption>7411825c-2187-45df-8a91-cd394a259fb3.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/clearfake-malware-abuses-trusted-windows-script-to-execute-hidden-powershell-commands/</loc><lastmod>2026-01-23T15:06:47.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/494c3418-a74c-4bd7-84ba-9357226e4572.png</image:loc><image:caption>494c3418-a74c-4bd7-84ba-9357226e4572.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/new-osiris-ransomware-deployed-by-attackers-with-ties-to-inc-ransomware-group/</loc><lastmod>2026-01-23T14:23:01.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/c10d5546-c448-446f-8d9f-37f5e3d9b441.png</image:loc><image:caption>c10d5546-c448-446f-8d9f-37f5e3d9b441.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/windows-11-january-security-update-triggers-system-lockups-and-black-screens/</loc><lastmod>2026-01-23T14:14:51.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/e94799b5-507b-40d3-a336-da6fceeabe2a.png</image:loc><image:caption>e94799b5-507b-40d3-a336-da6fceeabe2a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/konni-deploys-ai-generated-powershell-backdoor-in-campaign-targeting-blockchain-developers/</loc><lastmod>2026-01-22T15:55:50.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/b1ef15d2-7dce-4287-bda8-aa794e646e5e.png</image:loc><image:caption>b1ef15d2-7dce-4287-bda8-aa794e646e5e.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/automated-attacks-hijacking-fortigate-firewalls-via-sso-exploitation/</loc><lastmod>2026-01-22T15:17:38.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/b57f3b64-aa82-4d6a-9d26-9db93b842bee.png</image:loc><image:caption>b57f3b64-aa82-4d6a-9d26-9db93b842bee.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/north-koreas-andariel-unveils-new-malware-arsenal-in-2025-cyberattacks/</loc><lastmod>2026-01-22T15:10:01.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/2ee7438a-f881-4adf-8a3f-f84730fc61e9.png</image:loc><image:caption>2ee7438a-f881-4adf-8a3f-f84730fc61e9.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-code-injection-flaw-in-orval-threatens-javascript-supply-chain-cve-2026-23947/</loc><lastmod>2026-01-22T14:58:52.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/17fcba98-2f7b-4858-8cd1-86906197f5b8.png</image:loc><image:caption>17fcba98-2f7b-4858-8cd1-86906197f5b8.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisco-unified-communications-zero-day-exploited-in-the-wild-for-root-access-cve-2026-20045/</loc><lastmod>2026-01-22T11:42:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/15e8fc4c-3500-45b3-b0ad-69b933f8a05b.png</image:loc><image:caption>15e8fc4c-3500-45b3-b0ad-69b933f8a05b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/google-chrome-144-patches-high-severity-v8-race-condition-cve-2026-1220/</loc><lastmod>2026-01-21T21:18:55.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/9c763733-9d46-4892-aa49-cd3dc1b6d63b.png</image:loc><image:caption>9c763733-9d46-4892-aa49-cd3dc1b6d63b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisa-nsa-warn-of-chinese-brickstorm-malware-targeting-government-and-it-sectors/</loc><lastmod>2026-01-21T13:45:27.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/91a887fc-8f72-4015-9543-ff6f1f2676f7.png</image:loc><image:caption>91a887fc-8f72-4015-9543-ff6f1f2676f7.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-zoom-flaw-allows-meeting-participants-to-execute-code-on-enterprise-servers-cve-2026-22844/</loc><lastmod>2026-01-21T13:24:14.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/7576a93c-f577-431e-a5e7-74c2115879dd.png</image:loc><image:caption>7576a93c-f577-431e-a5e7-74c2115879dd.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/oracle-january-2026-critical-patch-update-fixes-336-vulnerabilities-including-cvss-10-0-fusion-middleware-flaw/</loc><lastmod>2026-01-21T13:18:35.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/185e0c31-3aec-4363-8f8c-1076a850311b.png</image:loc><image:caption>185e0c31-3aec-4363-8f8c-1076a850311b.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/microsoft-teams-gets-external-domain-anomaly-detection-to-combat-social-engineering-attacks/</loc><lastmod>2026-01-21T11:02:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/0aa1633f-0f18-4183-aa77-8ebd5248abb3.png</image:loc><image:caption>0aa1633f-0f18-4183-aa77-8ebd5248abb3.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/irans-cyber-forces-shift-from-espionage-to-infrastructure-pre-positioning/</loc><lastmod>2026-01-21T10:19:41.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/eab45df7-e146-4045-a844-857267d73033.png</image:loc><image:caption>eab45df7-e146-4045-a844-857267d73033.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/intelbroker-unmasked-notorious-hacker-revealed-as-25-year-old-former-uk-crime-agency-trainee/</loc><lastmod>2026-01-20T16:54:34.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/153e6195-06b7-4e22-8072-5a43a9408612.png</image:loc><image:caption>153e6195-06b7-4e22-8072-5a43a9408612.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/north-korean-hackers-hide-multi-stage-malware-in-npm-package-targeting-developers/</loc><lastmod>2026-01-20T16:38:30.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/e6a391bd-d191-477c-bd7b-37562cbd7052.png</image:loc><image:caption>e6a391bd-d191-477c-bd7b-37562cbd7052.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/voidlink-first-advanced-ai-generated-malware-framework-signals-new-era-of-threats/</loc><lastmod>2026-01-20T16:16:36.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/c62b85da-922e-4bd3-9ad4-e7272369bc45.png</image:loc><image:caption>c62b85da-922e-4bd3-9ad4-e7272369bc45.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-windows-admin-center-flaw-enables-tenant-wide-compromise-via-azure-sso-bypass-cve-2026-20965/</loc><lastmod>2026-01-19T20:39:39.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/342ea42a-1c59-44b5-9806-6551ba76053d.png</image:loc><image:caption>342ea42a-1c59-44b5-9806-6551ba76053d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cloudflare-waf-zero-day-allowed-attackers-to-bypass-security-controls-via-acme-challenge-path/</loc><lastmod>2026-01-19T19:29:06.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/c2d9f02c-d0d6-420c-bbab-757602ea3533.png</image:loc><image:caption>c2d9f02c-d0d6-420c-bbab-757602ea3533.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-apache-brpc-vulnerability-allows-remote-command-injection-cve-2025-60021/</loc><lastmod>2026-01-19T16:23:49.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/ebdb89cc-1439-4064-be83-c57c5b924003.png</image:loc><image:caption>ebdb89cc-1439-4064-be83-c57c5b924003.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-deno-vulnerabilities-enable-server-secrets-exposure-and-windows-command-injection/</loc><lastmod>2026-01-19T14:45:01.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/12e3bd00-6d9b-41d1-9227-e334a9026771.png</image:loc><image:caption>12e3bd00-6d9b-41d1-9227-e334a9026771.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/connectwise-patches-high-severity-xss-and-session-cookie-vulnerabilities-in-psa-platform/</loc><lastmod>2026-01-19T14:38:50.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/c9cb6b0d-ed6c-456e-9286-b2a106812972.png</image:loc><image:caption>c9cb6b0d-ed6c-456e-9286-b2a106812972.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/jordanian-man-pleads-guilty-to-selling-network-access-to-50-companies-as-initial-access-broker/</loc><lastmod>2026-01-19T14:26:58.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/a196c5a3-c2ed-45a8-a801-f977aaa16d8f.png</image:loc><image:caption>a196c5a3-c2ed-45a8-a801-f977aaa16d8f.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/ukraine-and-germany-expose-ransomware-group-members-russian-organizer-placed-on-interpol-wanted-list/</loc><lastmod>2026-01-19T14:15:26.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/14935471-9ba9-4c36-b81a-8d494af46135.png</image:loc><image:caption>14935471-9ba9-4c36-b81a-8d494af46135.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/canadian-investment-regulator-confirms-data-breach-affecting-750-000-investors/</loc><lastmod>2026-01-19T14:10:04.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/55f8e3cd-d98b-418d-957c-6c4b7a75ee08.png</image:loc><image:caption>55f8e3cd-d98b-418d-957c-6c4b7a75ee08.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/electron-vulnerability-allows-backdooring-of-signal-1password-slack-and-chrome/</loc><lastmod>2026-01-16T22:24:08.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/39cfc98a-0ef4-4f0b-adfb-d0ba47377327.png</image:loc><image:caption>39cfc98a-0ef4-4f0b-adfb-d0ba47377327.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/dutch-police-arrest-alleged-avcheck-mastermind-behind-major-counter-antivirus-platform/</loc><lastmod>2026-01-16T21:47:59.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/03578ec1-440d-40bc-a38b-c2fc398537eb-1.png</image:loc><image:caption>03578ec1-440d-40bc-a38b-c2fc398537eb-1.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/keylogger-discovered-on-major-us-banks-employee-store-affecting-200-000-staff/</loc><lastmod>2026-01-16T14:39:10.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/c8423c07-22a7-4a33-bb36-b5980346778a.png</image:loc><image:caption>c8423c07-22a7-4a33-bb36-b5980346778a.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/cisco-zero-day-rce-in-secure-email-gateway-actively-exploited-by-china-linked-threat-actor/</loc><lastmod>2026-01-16T14:29:02.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/8ec2f4d3-e11a-497c-b3c3-ee4464c27d27.png</image:loc><image:caption>8ec2f4d3-e11a-497c-b3c3-ee4464c27d27.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-aws-codebuild-flaw-exposed-aws-console-to-supply-chain-attack/</loc><lastmod>2026-01-16T14:06:37.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/bc627a23-27d7-43e1-9d16-5b0f615d902c.png</image:loc><image:caption>bc627a23-27d7-43e1-9d16-5b0f615d902c.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/microsoft-and-global-police-disrupt-redvds-a-scaled-engine-behind-massive-bec-fraud/</loc><lastmod>2026-01-15T16:19:53.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/1e2f6d0d-1ebe-4577-b17b-4d2ad91edb60.png</image:loc><image:caption>1e2f6d0d-1ebe-4577-b17b-4d2ad91edb60.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/microsoft-january-2026-patch-tuesday-114-vulnerabilities-fixed-including-3-zero-days/</loc><lastmod>2026-01-13T20:47:08.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/eccb1c72-58f0-4132-bdb6-4d4f8acb65ba.png</image:loc><image:caption>eccb1c72-58f0-4132-bdb6-4d4f8acb65ba.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/3-1-million-armenian-citizens-data-allegedly-for-sale-on-dark-web/</loc><lastmod>2026-01-13T18:14:21.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/09884988-690b-4566-b84e-141d56bbb9eb.png</image:loc><image:caption>09884988-690b-4566-b84e-141d56bbb9eb.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-patch-n8n-now-unauthenticated-rce-affects-100k-servers/</loc><lastmod>2026-01-12T22:27:53.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/Designer--2-.png</image:loc><image:caption>Designer--2-.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/gogs-rce-actively-exploited-cisa-adds-cve-2025-8110-to-kev-catalog/</loc><lastmod>2026-01-12T22:18:00.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/7f5b5b96-daea-4063-9e26-acc91904f26d.png</image:loc><image:caption>7f5b5b96-daea-4063-9e26-acc91904f26d.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/everest-ransomware-group-claims-900gb-data-theft-from-nissan/</loc><lastmod>2026-01-12T10:05:19.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/b20b65c7-1184-4c9f-bb2a-26c05c6444f4.png</image:loc><image:caption>b20b65c7-1184-4c9f-bb2a-26c05c6444f4.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/china-linked-hackers-deploy-custom-linux-malware-against-telecoms-in-espionage-campaign/</loc><lastmod>2026-01-11T19:19:45.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/Designer.png</image:loc><image:caption>Designer.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/vmware-esxi-zero-day-flaws-were-likely-exploited-in-the-wild-more-than-a-year-before-disclosure/</loc><lastmod>2026-01-11T12:53:53.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/8f8d2f3d-23d9-4317-83ba-176f815b8c35.png</image:loc><image:caption>8f8d2f3d-23d9-4317-83ba-176f815b8c35.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/muddywater-escalates-espionage-campaigns-with-new-rust-based-malware-rustywater/</loc><lastmod>2026-01-10T23:42:57.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/38f5f891-e9d5-4c7b-b885-5438372fc19f-md.jpeg</image:loc><image:caption>38f5f891-e9d5-4c7b-b885-5438372fc19f-md.jpeg</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/critical-zero-day-in-d-link-dsl-gateways-under-active-exploitation/</loc><lastmod>2026-01-10T19:09:42.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/OIG4.YEGPii9l0E35q.jpg</image:loc><image:caption>OIG4.YEGPii9l0E35q.jpg</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/forumtroll-hackers-target-russian-academics-in-new-phishing-attack/</loc><lastmod>2026-01-10T16:53:02.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/ChatGPT-Image-Jan-10--2026--04_51_38-PM.png</image:loc><image:caption>ChatGPT-Image-Jan-10--2026--04_51_38-PM.png</image:caption></image:image></url><url><loc>https://zero-day-wire-1.ghost.io/dozens-of-major-data-breaches-linked-to-single-threat-actor/</loc><lastmod>2026-01-09T23:43:20.000Z</lastmod><image:image><image:loc>https://zero-day-wire-1.ghost.io/content/images/2026/01/ChatGPT-Image-Jan-9--2026--11_18_10-PM.png</image:loc><image:caption>ChatGPT-Image-Jan-9--2026--11_18_10-PM.png</image:caption></image:image></url></urlset>