<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.8-a.7'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//thecyberthrone.in/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://thecyberthrone.in/2026/04/30/mini-shai-hulud-saps-npm-pipeline-poisoned-to-drain-enterprise-secrets/</loc>
  <lastmod>2026-04-30T10:00:18Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>TheCyberThrone</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Mini Shai-Hulud: SAP&amp;#039;s npm Pipeline Poisoned to Drain Enterprise Secrets</news:title>
   <news:publication_date>2026-04-30T10:00:18Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://thecyberthrone.in/2026/04/30/the-ungoverned-machine-shadow-ai-risk-and-the-enterprise-governance/</loc>
  <lastmod>2026-04-30T01:02:30Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>TheCyberThrone</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>The Ungoverned Machine - Shadow AI Risk and the Enterprise Governance</news:title>
   <news:publication_date>2026-04-30T01:02:30Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://thecyberthrone.in/2026/04/29/cisa-adds-two-vulnerabilities-to-kev-catalog-2/</loc>
  <lastmod>2026-04-29T02:55:02Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>TheCyberThrone</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>CISA adds Two vulnerabilities to KEV catalog</news:title>
   <news:publication_date>2026-04-29T02:55:02Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://thecyberthrone.in/2026/04/28/cissp-domain-2-data-handling-and-security-policies/</loc>
  <lastmod>2026-04-28T14:45:11Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>TheCyberThrone</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>CISSP Domain 2 – Data Handling and Security Policies</news:title>
   <news:publication_date>2026-04-28T14:45:11Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://thecyberthrone.in/2026/04/28/firestarter-cisco-asa-backdoor/</loc>
  <lastmod>2026-04-28T01:01:36Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>TheCyberThrone</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>FIRESTARTER: Cisco ASA Backdoor</news:title>
   <news:publication_date>2026-04-28T01:01:36Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>