<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/cve-2026-3502-trueconf-kev-malware-update-channel</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:10:45.313Z</news:publication_date>
      <news:title>CVE-2026-3502 turns TrueConf updates into a KEV-listed malware channel</news:title>
      <news:keywords>CVE-2026-3502, TrueConf vulnerability, TrueConf KEV, malicious software updates, on-prem update mechanism abuse, government cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/gigabyte-control-center-cve-2026-4415-remote-compromise-path</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:48:19.859Z</news:publication_date>
      <news:title>GIGABYTE Control Center flaw turns a convenience utility into a remote compromise path</news:title>
      <news:keywords>GIGABYTE Control Center, CVE-2026-4415, arbitrary file write, remote code execution, privilege escalation, OEM utility risk, pairing feature, Windows device management, endpoint hardening, patch management</news:keywords>
    </news:news>
  </url>
</urlset>