<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
    <url>
        <loc>https://www.hackalerta.com/artigo/falhas-criticas-corrigidas-em-produtos-crowdstrike-e-tenable</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-24T08:08:40+00:00</news:publication_date>
            <news:title>Falhas críticas corrigidas em produtos CrowdStrike e Tenable</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/falha-critica-lmdeploy-explorada-13-horas-divulgacao</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-24T06:11:53+00:00</news:publication_date>
            <news:title>Falha crítica no LMDeploy é explorada em menos de 13 horas após divulgação pública</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/nova-tecnica-elevacao-privilegios-windows-rpc-falha-arquitetural</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-24T06:11:32+00:00</news:publication_date>
            <news:title>Nova técnica de elevação de privilégios no Windows RPC expõe falha arquitetural sem correção da Microsoft</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/hackers-usam-bots-telegram-900-exploracoes-react2shell-nextjs</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-24T06:11:32+00:00</news:publication_date>
            <news:title>Hackers usam bots do Telegram para rastrear mais de 900 explorações da falha React2Shell no Next.js</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/google-aposta-em-agentes-de-ia-para-automatizar-seguranca</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T20:06:06+00:00</news:publication_date>
            <news:title>Google aposta em agentes de IA para automatizar segurança e antecipar ataques</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/hackers-exploram-falha-critica-plugin-breeze-cache-wordpress</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T20:06:06+00:00</news:publication_date>
            <news:title>Hackers exploram falha crítica no plugin Breeze Cache do WordPress</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/agencia-eua-invadida-vulnerabilidade-cisco-backdoor-firestarter</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T18:02:23+00:00</news:publication_date>
            <news:title>Agência dos eua é invadida através de vulnerabilidade da cisco com backdoor firestarter</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/pacote-npm-malicioso-transforma-hugging-face-cdn-malware</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T18:02:02+00:00</news:publication_date>
            <news:title>Pacote npm malicioso transforma hugging face em cdn de malware e exfiltração</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/variacao-malware-mirai-infecta-roteadores-d-link-sem-aviso</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T18:02:02+00:00</news:publication_date>
            <news:title>Variação do malware Mirai infecta roteadores D-Link sem aviso prévio</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/ameaca-unc6692-usa-engenharia-social-microsoft-teams-malware-snow</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T16:17:53+00:00</news:publication_date>
            <news:title>Ameaça UNC6692 usa engenharia social no Microsoft Teams para implantar malware SNOW</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/empresas-vigilancia-exploram-falha-telecom-rastrear-alvos</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T16:17:32+00:00</news:publication_date>
            <news:title>Empresas de vigilância exploram falha em infraestrutura de telecom para rastrear alvos</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/ransomware-trigona-utiliza-ferramenta-exfiltracao-personalizada</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T16:17:32+00:00</news:publication_date>
            <news:title>Ransomware Trigona utiliza ferramenta de exfiltração personalizada para roubar dados</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/bitwarden-cli-comprometido-ataque-cadeia-suprimentos-github-actions</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T14:01:32+00:00</news:publication_date>
            <news:title>Bitwarden CLI comprometido em ataque à cadeia de suprimentos via GitHub Actions</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/rituals-divulga-violacao-dados-clientes</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T10:01:49+00:00</news:publication_date>
            <news:title>Gigante de cosméticos Rituals divulga violação de dados de clientes</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/cisa-correcao-falha-zero-day-microsoft-defender</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T10:01:28+00:00</news:publication_date>
            <news:title>CISA ordena correção de falha zero-day no Microsoft Defender explorada em ataques</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/campanha-malware-needle-stealer-assistente-trading-ia</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T10:01:28+00:00</news:publication_date>
            <news:title>Campanha de malware Needle Stealer se disfarça de assistente de trading com IA</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/grupo-apt-china-infecta-sistemas-governamentais-mongolia-backdoors-go</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T08:02:42+00:00</news:publication_date>
            <news:title>Grupo APT ligado à China infecta sistemas governamentais da Mongólia com backdoors em Go</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/grupo-tropic-trooper-usa-tuneis-vs-code-github-comando-controle</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T08:02:21+00:00</news:publication_date>
            <news:title>Grupo Tropic Trooper usa túneis do VS Code e GitHub como canal de comando e controle</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/vercel-confirma-violacao-seguranca-contas-clientes-comprometidas</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-23T08:02:21+00:00</news:publication_date>
            <news:title>Vercel confirma violação de segurança e contas de clientes comprometidas via cadeia de suprimentos</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/relatorio-sonicwall-2026-falhas-cr%C3%ADticas-seguranca-brasil</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T20:01:30+00:00</news:publication_date>
            <news:title>Relatório SonicWall 2026 aponta falhas críticas de segurança no Brasil</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/109-repositorios-falsos-github-entregam-malware-smartloader-stealc</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T20:01:30+00:00</news:publication_date>
            <news:title>109 repositórios falsos do GitHub entregam malware SmartLoader e StealC</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/redes-criminosas-contas-fintech-lavagem-dinheiro</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T18:08:58+00:00</news:publication_date>
            <news:title>Redes criminosas exploram contas fintech francesas para lavagem de dinheiro</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/apple-corrige-falha-ios-notificacao-dados-apagados</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T18:08:58+00:00</news:publication_date>
            <news:title>Apple corrige falha no iOS que mantinha dados de notificação apagados</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/worm-auto-propagante-em-pacotes-npm-rouba-tokens-de-desenvolvedores-e-se-espalha-via-icp</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T16:03:21+00:00</news:publication_date>
            <news:title>Worm auto-propagante em pacotes npm rouba tokens de desenvolvedores e se espalha via ICP</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/falsificacao-de-imagens-docker-e-extensoes-vs-code-compromete-cadeia-de-suprimentos-da-checkmarx</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T16:03:00+00:00</news:publication_date>
            <news:title>Falsificação de imagens Docker e extensões VS Code compromete cadeia de suprimentos da Checkmarx</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/gangue-kyber-usa-criptografia-pos-quantica-em-ataques-a-windows-e-vmware-esxi</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T16:03:00+00:00</news:publication_date>
            <news:title>Gangue Kyber usa criptografia pós-quântica em ataques a Windows e VMware ESXi</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/policia-francesa-prende-suspeito-dezenas-violacoes-dados</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T14:01:34+00:00</news:publication_date>
            <news:title>Polícia francesa prende suspeito por dezenas de violações de dados</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/rat-auraboros-expoe-painel-c2-sem-autenticacao-brasil</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T14:01:34+00:00</news:publication_date>
            <news:title>RAT Auraboros expõe painel C2 sem autenticação e tem origem no Brasil</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/mastodon-sofre-ataque-ddos-massivo-apos-bluesky-mas-mitigacao-ocorre-em-poucas-horas</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T12:10:31+00:00</news:publication_date>
            <news:title>Mastodon sofre ataque DDoS massivo após Bluesky, mas mitigação ocorre em poucas horas</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/inteligencia-holandesa-alerta-capacidades-cibereticas-china-igualam-eua</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T12:10:10+00:00</news:publication_date>
            <news:title>Inteligência holandesa alerta que capacidades cibernéticas da China agora igualam as dos EUA</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/campanha-norte-coreana-usa-empregos-falsos-e-repositorios-comprometidos-para-distribuir-malware</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T12:10:10+00:00</news:publication_date>
            <news:title>Campanha norte-coreana usa empregos falsos e repositórios comprometidos para distribuir malware</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/rede-massiva-de-sim-farm-as-a-service-expoe-87-paineis-de-controle</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T10:02:48+00:00</news:publication_date>
            <news:title>Rede massiva de SIM Farm-as-a-Service expõe 87 painéis de controle em 17 países</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/backdoor-dindoor-usa-runtime-deno-e-instaladores-msi-para-evadir-deteccao</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T10:02:27+00:00</news:publication_date>
            <news:title>Backdoor DinDoor usa runtime Deno e instaladores MSI para evadir detecção</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://www.hackalerta.com/artigo/novo-malware-wiper-lotus-wiper-ataca-setor-energetico-venezuelano</loc>
        <news:news>
            <news:publication>
                <news:name>Hack Alerta</news:name>
                <news:language>pt</news:language>
            </news:publication>
            <news:publication_date>2026-04-22T10:02:27+00:00</news:publication_date>
            <news:title>Novo malware Wiper Lotus Wiper ataca setor energético venezuelano antes de intervenção dos EUA</news:title>
        </news:news>
    </url>
</urlset>