<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/supply-chain-security/glassworm-openvsx-sleeper-extensions-malware-delivery</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T08:06:19.898Z</news:publication_date>
      <news:title>GlassWorm sleeper extensions turn Open VSX updates into a malware delivery path</news:title>
      <news:keywords>GlassWorm Open VSX sleeper extensions, OpenVSX malicious extension update, developer supply chain malware, VSIX payload delivery, GitHub hosted extension malware, developer secrets theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/cve-2026-33032-nginx-ui-mcp-server-takeover</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T08:03:32.709Z</news:publication_date>
      <news:title>CVE-2026-33032 lets attackers take over exposed nginx-ui servers</news:title>
      <news:keywords>CVE-2026-33032, nginx-ui vulnerability, MCP auth bypass, nginx server takeover, reverse proxy security, active exploitation</news:keywords>
    </news:news>
  </url>
</urlset>