<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/windows-defender-zero-days-active-system-access-risk</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T08:07:40.240Z</news:publication_date>
      <news:title>Leaked Windows Defender zero-days are already being used to gain SYSTEM access</news:title>
      <news:keywords>Windows Defender zero-day, RedSun zero-day, BlueHammer CVE-2026-33825, UnDefend exploit, Windows privilege escalation, SYSTEM access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/threat-hunting-and-intel/agingfly-campaign-targets-ukraine-government-hospitals</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T08:07:31.484Z</news:publication_date>
      <news:title>AgingFly campaign hits Ukrainian government and hospital networks</news:title>
      <news:keywords>AgingFly malware, CERT-UA, Ukraine cyberattacks, hospital malware, browser credential theft, WhatsApp data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/nginx-ui-cve-2026-33032-full-nginx-takeover</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T20:31:18.382Z</news:publication_date>
      <news:title>CVE-2026-33032 in nginx-ui Enables Full Nginx Server Takeover via Unauthenticated MCP Access</news:title>
      <news:keywords>nginx-ui, CVE-2026-33032, Authentication Bypass, Nginx, MCP, Server Takeover</news:keywords>
    </news:news>
  </url>
</urlset>