<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/threat-hunting-and-intel/daemon-tools-supply-chain-attack-signed-installer-backdoor</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T08:06:52.540Z</news:publication_date>
      <news:title>DAEMON Tools supply-chain attack turns trusted installers into a malware delivery path</news:title>
      <news:keywords>DAEMON Tools supply chain attack, trojanized signed installers, software distribution compromise, QUIC RAT DAEMON Tools, trusted installer malware risk</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/cloud-and-application-security/vishing-sso-abuse-rapid-saas-extortion</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:16:55.960Z</news:publication_date>
      <news:title>Vishing and SSO abuse are accelerating rapid SaaS extortion</news:title>
      <news:keywords>vishing SaaS extortion, SSO abuse cybercrime, Cordial Spider Snarky Spider, identity provider attack path, SaaS data theft extortion</news:keywords>
    </news:news>
  </url>
</urlset>