<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Cyber Feed Aggregator</title>
    <link>https://news.secretshare.me</link>
    <description>Stay on top of cybersecurity news with curated feeds spanning tools, breaches, ransomware, CTF events, exploits, and more.</description>
    <language>en</language>
    <lastBuildDate>Fri, 10 Apr 2026 11:18:05 GMT</lastBuildDate>
    <atom:link href="https://news.secretshare.me/feed.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>Generative AI Bootcamp for Designers &amp; Creators</title>
      <link>https://crackingx.com/threads/71129/</link>
      <guid isPermaLink="true">https://crackingx.com/threads/71129/</guid>
      <pubDate>Fri, 10 Apr 2026 11:15:27 GMT</pubDate>
      <source>CrackingX: Free HQ Combos, OpenBullet Configs &amp; Proxies - Cracking Forum</source>
      <description>Requirements&amp;#8203; No prior AI experience required. Basic computer skills and an interest in design or creativity are sufficient. Access to AI tools recommended.&amp;#8203; Description&amp;#8203;The creative industry is evolving rapidly, and Generative AI is becoming an essential skill for modern designers and...&amp;#8203;...</description>
    </item>
    <item>
      <title>[✨ NETFLIX ✨]⚡NETFLIX STREAMING PREMIUM HITS☄️ |☄️TODAY CHECKED ☄️ | ⭐ NETFLIX ⭐</title>
      <link>https://altenens.is/threads/sparkles-netflix-sparkles-high-voltagenetflix-streaming-premium-hitscomet-comettoday-checked-comet-star-netflix-star.2925954/</link>
      <guid isPermaLink="true">https://altenens.is/threads/sparkles-netflix-sparkles-high-voltagenetflix-streaming-premium-hitscomet-comettoday-checked-comet-star-netflix-star.2925954/</guid>
      <pubDate>Fri, 10 Apr 2026 11:15:05 GMT</pubDate>
      <source>Altenen Forum | Hacking, Cracking, Onlyfans Leaks &amp; Making Money</source>
      <description>THIS THREAD IS SPONSORED BY LINKEDIN PREMIUM UPGRADING SERVICE GET HIRED QUICKLY WITH PREMIUM &amp;amp; GROW YOUR BUSINESS ONLINE 100% LEGAL UPGRADE. BUY : &amp;quot;HERE&amp;quot; You must reply before you can see the hidden data contained here. &amp;#8203;</description>
    </item>
    <item>
      <title>[MEGA] Billie Eilish Pack Leaked | Pics &amp; Videos</title>
      <link>https://altenens.is/threads/mega-billie-eilish-pack-leaked-pics-videos.2252728/</link>
      <guid isPermaLink="true">https://altenens.is/threads/mega-billie-eilish-pack-leaked-pics-videos.2252728/</guid>
      <pubDate>Fri, 10 Apr 2026 11:14:38 GMT</pubDate>
      <source>Altenen Forum | Hacking, Cracking, Onlyfans Leaks &amp; Making Money</source>
      <description>You must reply before you can see the hidden data contained here.</description>
    </item>
    <item>
      <title>✅ [PAID LEAK] ⚡ Make $100K+ With Honeypot ⭐ RugPull Method</title>
      <link>https://altenens.is/threads/check-mark-button-paid-leak-high-voltage-make-100k-with-honeypot-star-rugpull-method.2925952/</link>
      <guid isPermaLink="true">https://altenens.is/threads/check-mark-button-paid-leak-high-voltage-make-100k-with-honeypot-star-rugpull-method.2925952/</guid>
      <pubDate>Fri, 10 Apr 2026 11:14:09 GMT</pubDate>
      <source>Altenen Forum | Hacking, Cracking, Onlyfans Leaks &amp; Making Money</source>
      <description>Came across this while browsing a private server Assumed it was dead by now but I actually put this to work and made up to $32k using just this. This is purely a straight forward method working perfectly right now in 2026. You must reply before you can see the hidden data contained here. Please like for my effort...</description>
    </item>
    <item>
      <title>「 189K 」░░ REDDIT ░░ GOOD QUALITY⭐100% PRIVATE⭐MANY HITS⭐NO SQLI DUMPER⭐NEW 2026⭐</title>
      <link>https://niflheim.world/threads/%E3%80%8C-189k-%E3%80%8D%E2%96%91%E2%96%91-reddit-%E2%96%91%E2%96%91-good-quality%E2%AD%90100-private%E2%AD%90many-hits%E2%AD%90no-sqli-dumper%E2%AD%90new-2026%E2%AD%90.167645/</link>
      <guid isPermaLink="true">https://niflheim.world/threads/%E3%80%8C-189k-%E3%80%8D%E2%96%91%E2%96%91-reddit-%E2%96%91%E2%96%91-good-quality%E2%AD%90100-private%E2%AD%90many-hits%E2%AD%90no-sqli-dumper%E2%AD%90new-2026%E2%AD%90.167645/</guid>
      <pubDate>Fri, 10 Apr 2026 11:13:53 GMT</pubDate>
      <source>Niflheim World</source>
      <description>To view the content, you need to Sign In or Register.</description>
    </item>
    <item>
      <title>✅ [PAID LEAK] ⚡ Make $100K+ With Honeypot ⭐ RugPull Method</title>
      <link>https://niflheim.world/threads/%E2%9C%85-paid-leak-%E2%9A%A1-make-100k-with-honeypot-%E2%AD%90-rugpull-method.167669/</link>
      <guid isPermaLink="true">https://niflheim.world/threads/%E2%9C%85-paid-leak-%E2%9A%A1-make-100k-with-honeypot-%E2%AD%90-rugpull-method.167669/</guid>
      <pubDate>Fri, 10 Apr 2026 11:13:36 GMT</pubDate>
      <source>Niflheim World</source>
      <description>Came across this while browsing a private server Assumed it was dead by now but I actually put this to work and made up to $32k using just this. This is purely a straight forward method working perfectly right now in 2026. [hide] &amp;gt;&amp;gt;&amp;gt; CLICK HERE TO DOWNLOAD FOR FREE &amp;lt;&amp;lt;&amp;lt; [/hide] Please like for my...</description>
    </item>
    <item>
      <title>82K GERMANY  Full Valid Mail Access 10.04</title>
      <link>https://crackingx.com/threads/71657/</link>
      <guid isPermaLink="true">https://crackingx.com/threads/71657/</guid>
      <pubDate>Fri, 10 Apr 2026 11:12:57 GMT</pubDate>
      <source>CrackingX: Free HQ Combos, OpenBullet Configs &amp; Proxies - Cracking Forum</source>
      <description>82K GERMANY Full Valid Mail Access 10.04 View hidden content is available for registered users!</description>
    </item>
    <item>
      <title>82K GERMANY  Full Valid Mail Access 10.04</title>
      <link>https://niflheim.world/threads/82k-germany-full-valid-mail-access-10-04.167668/</link>
      <guid isPermaLink="true">https://niflheim.world/threads/82k-germany-full-valid-mail-access-10-04.167668/</guid>
      <pubDate>Fri, 10 Apr 2026 11:12:43 GMT</pubDate>
      <source>Niflheim World</source>
      <description>82K GERMANY Full Valid Mail Access 10.04 [HIDE] 2.93 MB file on MEGA mega.nz [/HIDE]</description>
    </item>
    <item>
      <title>10 NEW HOT TEEN PRIVATE SNAPLEAK + SEXTAPE LEAK</title>
      <link>https://altenens.is/threads/10-new-hot-teen-private-snapleak-sextape-leak.2903247/</link>
      <guid isPermaLink="true">https://altenens.is/threads/10-new-hot-teen-private-snapleak-sextape-leak.2903247/</guid>
      <pubDate>Fri, 10 Apr 2026 11:12:07 GMT</pubDate>
      <source>Altenen Forum | Hacking, Cracking, Onlyfans Leaks &amp; Making Money</source>
      <description>You must reply before you can see the hidden data contained here.</description>
    </item>
    <item>
      <title>✅⭐⚡️130X NETFLİX PREMİUM ACCOUNTS✅⭐</title>
      <link>https://altenens.is/threads/check-mark-buttonstarhigh-voltage130x-netflix-premium-accountscheck-mark-buttonstar.2924657/</link>
      <guid isPermaLink="true">https://altenens.is/threads/check-mark-buttonstarhigh-voltage130x-netflix-premium-accountscheck-mark-buttonstar.2924657/</guid>
      <pubDate>Fri, 10 Apr 2026 11:11:33 GMT</pubDate>
      <source>Altenen Forum | Hacking, Cracking, Onlyfans Leaks &amp; Making Money</source>
      <description>You must reply before you can see the hidden data contained here.</description>
    </item>
    <item>
      <title>✅ [LEAK] ⚡ Insane $300 Per Day Blueprint Premium Method</title>
      <link>https://crackingx.com/threads/71656/</link>
      <guid isPermaLink="true">https://crackingx.com/threads/71656/</guid>
      <pubDate>Fri, 10 Apr 2026 11:10:29 GMT</pubDate>
      <source>CrackingX: Free HQ Combos, OpenBullet Configs &amp; Proxies - Cracking Forum</source>
      <description>Found this tucked away in a private forum Try It. It&#39;s FREE to download Might help you make some extra money as a side hustle. &amp;gt;&amp;gt;&amp;gt; CLICK HERE TO DOWNLOAD FOR FREE &amp;lt;&amp;lt;&amp;lt; Please like for my effort in sharing it here CHECK MY PROFILE TO DOWNLOAD MORE FREE METHODS... Read more</description>
    </item>
    <item>
      <title>✅ [LEAK] ⚡ Insane $300 Per Day Blueprint Premium Method</title>
      <link>https://niflheim.world/threads/%E2%9C%85-leak-%E2%9A%A1-insane-300-per-day-blueprint-premium-method.167667/</link>
      <guid isPermaLink="true">https://niflheim.world/threads/%E2%9C%85-leak-%E2%9A%A1-insane-300-per-day-blueprint-premium-method.167667/</guid>
      <pubDate>Fri, 10 Apr 2026 11:10:11 GMT</pubDate>
      <source>Niflheim World</source>
      <description>Found this tucked away in a private forum Try It. It&#39;s FREE to download Might help you make some extra money as a side hustle. &amp;gt;&amp;gt;&amp;gt; CLICK HERE TO DOWNLOAD FOR FREE &amp;lt;&amp;lt;&amp;lt; Please like for my effort in sharing it here CHECK MY PROFILE TO DOWNLOAD MORE FREE METHODS... [LEAK] Insane $300 Per Day Blueprint...</description>
    </item>
    <item>
      <title>✅ VERIFIED ACCOUNTS ⚡️ CHEAP PRICE ⚡️ 24 HOUR WARRANTY ⚡️ CUSTOM MADE</title>
      <link>https://crackingx.com/threads/33921/</link>
      <guid isPermaLink="true">https://crackingx.com/threads/33921/</guid>
      <pubDate>Fri, 10 Apr 2026 11:07:42 GMT</pubDate>
      <source>CrackingX: Free HQ Combos, OpenBullet Configs &amp; Proxies - Cracking Forum</source>
      <description>{ &quot;lightbox_close&quot;: &quot;Close&quot;, &quot;lightbox_next&quot;: &quot;Next&quot;, &quot;lightbox_previous&quot;: &quot;Previous&quot;, &quot;lightbox_error&quot;: &quot;The requested content cannot be loaded. Please try again later.&quot;, &quot;lightbox_start_slideshow&quot;: &quot;Start slideshow&quot;, &quot;lightbox_stop_slideshow&quot;: &quot;Stop slideshow&quot;, &quot;lightbox_full_screen&quot;: &quot;Full screen&quot;,...</description>
    </item>
    <item>
      <title>PSD &amp; PDF TEMPLATES - PERSONAL UNIQUE COLLECTION</title>
      <link>https://niflheim.world/threads/psd-pdf-templates-personal-unique-collection.93698/</link>
      <guid isPermaLink="true">https://niflheim.world/threads/psd-pdf-templates-personal-unique-collection.93698/</guid>
      <pubDate>Fri, 10 Apr 2026 11:06:12 GMT</pubDate>
      <source>Niflheim World</source>
      <description>Hi, I have a collection of unique PSD &amp;amp; PDF templates for do-it-yourself photoshop work. This is a private compilation that has accumulated over several years of working and editing. I have over 1000+ PSD &amp;amp; PDF templates. If anyone is interested you can ask me for details. I am ready to sell the whole...</description>
    </item>
    <item>
      <title>Proxy Scraper &amp; Checker — Advanced Tool with 100+ Sources</title>
      <link>https://crackingx.com/threads/67721/</link>
      <guid isPermaLink="true">https://crackingx.com/threads/67721/</guid>
      <pubDate>Fri, 10 Apr 2026 11:05:59 GMT</pubDate>
      <source>CrackingX: Free HQ Combos, OpenBullet Configs &amp; Proxies - Cracking Forum</source>
      <description>Scraping 60+ built-in proxy sources (GitHub, APIs, web scraping) HTTP / HTTPS / SOCKS4 / SOCKS5 support Concurrent multi-threaded scraping Custom source URLs Load from file or paste from clipboard Checking Multi-threaded checker (up to 500 threads) Configurable timeout, retries, thread count 4 check modes: Basic /...</description>
    </item>
    <item>
      <title>Browser Extensions Are the New AI Consumption Channel That No One Is Talking About</title>
      <link>https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html</link>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html</guid>
      <pubDate>Fri, 10 Apr 2026 11:00:00 GMT</pubDate>
      <source>The Hacker News</source>
      <description>While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there&#39;s a wide-open window nobody&#39;s guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your...</description>
    </item>
    <item>
      <title>Google rolls out Gmail end-to-end encryption on mobile devices</title>
      <link>https://www.bleepingcomputer.com/news/google/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices/</link>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/google/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices/</guid>
      <pubDate>Fri, 10 Apr 2026 10:44:08 GMT</pubDate>
      <source>BleepingComputer</source>
      <description>Google says Gmail end-to-end encryption (E2EE) is now available on all Android and iOS devices, allowing enterprise users to read and compose emails without additional tools. [...]</description>
    </item>
    <item>
      <title>md5 x277</title>
      <link>https://forum.hashkiller.io/index.php?threads/md5-x277.77873/</link>
      <guid isPermaLink="true">https://forum.hashkiller.io/index.php?threads/md5-x277.77873/</guid>
      <pubDate>Fri, 10 Apr 2026 10:33:23 GMT</pubDate>
      <source>Hashkiller</source>
      <description>md5 x277</description>
    </item>
    <item>
      <title>CVE-2021-47961 - Synology SSL VPN Client Plaintext Password Storage Vulnerability</title>
      <link>https://cvefeed.io/vuln/detail/CVE-2021-47961</link>
      <guid isPermaLink="true">https://cvefeed.io/vuln/detail/CVE-2021-47961</guid>
      <pubDate>Fri, 10 Apr 2026 10:16:03 GMT</pubDate>
      <source>Latest High/Critical Vulnerabilitiy Feed</source>
      <description>CVE ID :CVE-2021-47961 Published : April 10, 2026, 10:16 a.m. | 56 minutes ago Description :A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access or influence the user&#39;s PIN code due to insecure storage. This may lead to unauthorized VPN...</description>
    </item>
    <item>
      <title>🏴‍☠️ Ailock has just published a new victim : Alvi Associates</title>
      <link>https://www.ransomware.live/id/QWx2aSBBc3NvY2lhdGVzQEFpTG9jaw==</link>
      <guid isPermaLink="true">https://www.ransomware.live/id/QWx2aSBBc3NvY2lhdGVzQEFpTG9jaw==</guid>
      <pubDate>Fri, 10 Apr 2026 09:28:35 GMT</pubDate>
      <source>Ransomware.live RSS Feed</source>
      <description>Founded in 1979, Alvi Associates, Inc. specializes in integrated engineering services for infrastructure projects, including structural, water resources, transportation, and geotechnical engineering.</description>
    </item>
    <item>
      <title>Multiple TP-Link Vulnerabilities Allow Attackers to Seize Control of the Device</title>
      <link>https://cybersecuritynews.com/multiple-tp-link-vulnerabilities-seize-control-of-the-device/</link>
      <guid isPermaLink="true">https://cybersecuritynews.com/multiple-tp-link-vulnerabilities-seize-control-of-the-device/</guid>
      <pubDate>Fri, 10 Apr 2026 09:16:08 GMT</pubDate>
      <source>Latest Newsroom</source>
      <description>Multiple TP-Link Vulnerabilities Allow Attackers to Seize Control of the Device Read more Published Date: Apr 10, 2026 (1 hour, 59 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-30818 CVE-2026-30817 CVE-2026-30816 CVE-2026-30815 CVE-2026-30814</description>
    </item>
    <item>
      <title>Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows</title>
      <link>https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html</link>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html</guid>
      <pubDate>Fri, 10 Apr 2026 07:58:00 GMT</pubDate>
      <source>The Hacker News</source>
      <description>Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome...</description>
    </item>
    <item>
      <title>Juniper Networks Default Password Vulnerability Let Attacker Take Full Control of the Device</title>
      <link>https://cybersecuritynews.com/juniper-networks-default-password-vulnerability/</link>
      <guid isPermaLink="true">https://cybersecuritynews.com/juniper-networks-default-password-vulnerability/</guid>
      <pubDate>Fri, 10 Apr 2026 07:40:36 GMT</pubDate>
      <source>Latest Newsroom</source>
      <description>Juniper Networks Default Password Vulnerability Let Attacker Take Full Control of the Device Read more Published Date: Apr 10, 2026 (3 hours, 35 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-33784</description>
    </item>
    <item>
      <title>React Server Components Vulnerability Enables DoS Attacks</title>
      <link>https://cybersecuritynews.com/react-server-components-vulnerability-2/</link>
      <guid isPermaLink="true">https://cybersecuritynews.com/react-server-components-vulnerability-2/</guid>
      <pubDate>Fri, 10 Apr 2026 07:39:32 GMT</pubDate>
      <source>Latest Newsroom</source>
      <description>React Server Components Vulnerability Enables DoS Attacks Read more Published Date: Apr 10, 2026 (3 hours, 36 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-23869</description>
    </item>
    <item>
      <title>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure</title>
      <link>https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html</link>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html</guid>
      <pubDate>Fri, 10 Apr 2026 07:37:00 GMT</pubDate>
      <source>Latest Newsroom</source>
      <description>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure Read more Published Date: Apr 10, 2026 (3 hours, 39 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-39987 CVE-2026-35616 CVE-2026-5281 CVE-2026-34040 CVE-2025-55182</description>
    </item>
    <item>
      <title>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure</title>
      <link>https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html</link>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html</guid>
      <pubDate>Fri, 10 Apr 2026 07:37:00 GMT</pubDate>
      <source>The Hacker News</source>
      <description>A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution...</description>
    </item>
    <item>
      <title>April 2026 Patch Tuesday forecast: Spring-cleaning of a preview</title>
      <link>https://www.helpnetsecurity.com/2026/04/10/april-2026-patch-tuesday-forecast/</link>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/10/april-2026-patch-tuesday-forecast/</guid>
      <pubDate>Fri, 10 Apr 2026 07:22:04 GMT</pubDate>
      <source>Latest Newsroom</source>
      <description>April 2026 Patch Tuesday forecast: Spring-cleaning of a preview Read more Published Date: Apr 10, 2026 (3 hours, 54 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-34197 CVE-2026-5281</description>
    </item>
    <item>
      <title>CVE-2026-6029 - Totolink A7100RU CGI cstecgi.cgi setVpnAccountCfg os command injection</title>
      <link>https://cvefeed.io/vuln/detail/CVE-2026-6029</link>
      <guid isPermaLink="true">https://cvefeed.io/vuln/detail/CVE-2026-6029</guid>
      <pubDate>Fri, 10 Apr 2026 07:16:22 GMT</pubDate>
      <source>Latest High/Critical Vulnerabilitiy Feed</source>
      <description>CVE ID :CVE-2026-6029 Published : April 10, 2026, 7:16 a.m. | 3 hours, 56 minutes ago Description :A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the...</description>
    </item>
    <item>
      <title>CVE-2026-6028 - Totolink A7100RU CGI cstecgi.cgi setPptpServerCfg os command injection</title>
      <link>https://cvefeed.io/vuln/detail/CVE-2026-6028</link>
      <guid isPermaLink="true">https://cvefeed.io/vuln/detail/CVE-2026-6028</guid>
      <pubDate>Fri, 10 Apr 2026 07:16:21 GMT</pubDate>
      <source>Latest High/Critical Vulnerabilitiy Feed</source>
      <description>CVE ID :CVE-2026-6028 Published : April 10, 2026, 7:16 a.m. | 3 hours, 56 minutes ago Description :A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the...</description>
    </item>
    <item>
      <title>CVE-2026-6027 - Totolink A7100RU CGI cstecgi.cgi setUrlFilterRules os command injection</title>
      <link>https://cvefeed.io/vuln/detail/CVE-2026-6027</link>
      <guid isPermaLink="true">https://cvefeed.io/vuln/detail/CVE-2026-6027</guid>
      <pubDate>Fri, 10 Apr 2026 07:16:21 GMT</pubDate>
      <source>Latest High/Critical Vulnerabilitiy Feed</source>
      <description>CVE ID :CVE-2026-6027 Published : April 10, 2026, 7:16 a.m. | 3 hours, 56 minutes ago Description :A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the...</description>
    </item>
    <item>
      <title>CVE-2026-6026 - Totolink A7100RU CGI cstecgi.cgi setPortalConfWeChat os command injection</title>
      <link>https://cvefeed.io/vuln/detail/CVE-2026-6026</link>
      <guid isPermaLink="true">https://cvefeed.io/vuln/detail/CVE-2026-6026</guid>
      <pubDate>Fri, 10 Apr 2026 07:16:21 GMT</pubDate>
      <source>Latest High/Critical Vulnerabilitiy Feed</source>
      <description>CVE ID :CVE-2026-6026 Published : April 10, 2026, 7:16 a.m. | 3 hours, 56 minutes ago Description :A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setPortalConfWeChat of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a...</description>
    </item>
    <item>
      <title>Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers</title>
      <link>https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html</link>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html</guid>
      <pubDate>Fri, 10 Apr 2026 06:28:00 GMT</pubDate>
      <source>The Hacker News</source>
      <description>Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress...</description>
    </item>
    <item>
      <title>🏴‍☠️ Incransom has just published a new victim : martek co ltd.</title>
      <link>https://www.ransomware.live/id/bWFydGVrIGNvIGx0ZC5AaW5jcmFuc29t</link>
      <guid isPermaLink="true">https://www.ransomware.live/id/bWFydGVrIGNvIGx0ZC5AaW5jcmFuc29t</guid>
      <pubDate>Fri, 10 Apr 2026 03:42:29 GMT</pubDate>
      <source>Ransomware.live RSS Feed</source>
      <description>https://www.martek.com.tw/en 700gb NDA</description>
    </item>
    <item>
      <title>md5 x212</title>
      <link>https://forum.hashkiller.io/index.php?threads/md5-x212.77875/</link>
      <guid isPermaLink="true">https://forum.hashkiller.io/index.php?threads/md5-x212.77875/</guid>
      <pubDate>Fri, 10 Apr 2026 03:04:23 GMT</pubDate>
      <source>Hashkiller</source>
      <description>md5 help</description>
    </item>
    <item>
      <title>25 Hashes or Less Requests (Std)</title>
      <link>https://forum.hashkiller.io/index.php?threads/25-hashes-or-less-requests-std.31215/</link>
      <guid isPermaLink="true">https://forum.hashkiller.io/index.php?threads/25-hashes-or-less-requests-std.31215/</guid>
      <pubDate>Fri, 10 Apr 2026 01:45:10 GMT</pubDate>
      <source>Hashkiller</source>
      <description>New topic created for this other one got too big! Post in here from now on please :)</description>
    </item>
    <item>
      <title>🏴‍☠️ Silentransomgroup has just published a new victim : Goulston &amp; Storrs</title>
      <link>https://www.ransomware.live/id/R291bHN0b24gJiBTdG9ycnNAU2lsZW50UmFuc29tR3JvdXA=</link>
      <guid isPermaLink="true">https://www.ransomware.live/id/R291bHN0b24gJiBTdG9ycnNAU2lsZW50UmFuc29tR3JvdXA=</guid>
      <pubDate>Fri, 10 Apr 2026 00:58:38 GMT</pubDate>
      <source>Ransomware.live RSS Feed</source>
      <description>[AI generated] Goulston &amp; Storrs is a full-service law firm headquartered in Boston, Massachusetts, USA, with additional offices in New York, Washington DC, and Beijing. The firm operates in the legal services industry, advising clients on real estate, corporate transactions, litigation, and finance matters. It...</description>
    </item>
    <item>
      <title>🏴‍☠️ Incransom has just published a new victim : Kannarr Eye Care</title>
      <link>https://www.ransomware.live/id/S2FubmFyciBFeWUgQ2FyZUBpbmNyYW5zb20=</link>
      <guid isPermaLink="true">https://www.ransomware.live/id/S2FubmFyciBFeWUgQ2FyZUBpbmNyYW5zb20=</guid>
      <pubDate>Fri, 10 Apr 2026 00:33:02 GMT</pubDate>
      <source>Ransomware.live RSS Feed</source>
      <description>Kannarr Eye Care is a full-service optometry provider located in Pittsburg, Kansas, dedicated to improving lives through advanced eye care. They offer a wide range of services including eye exams, contact lens fittings, cataract surgery, and treatment for ocular diseases. The clinic serves patients in the...</description>
    </item>
    <item>
      <title>25 Hashes or Less Requests (Other)</title>
      <link>https://forum.hashkiller.io/index.php?threads/25-hashes-or-less-requests-other.25112/</link>
      <guid isPermaLink="true">https://forum.hashkiller.io/index.php?threads/25-hashes-or-less-requests-other.25112/</guid>
      <pubDate>Fri, 10 Apr 2026 00:17:35 GMT</pubDate>
      <source>Hashkiller</source>
      <description>hello! I hope it is ok to post here since general hash requests forum seems to be locked now. Any help with the two office hashes below is highly appreciated....</description>
    </item>
    <item>
      <title>New ‘LucidRook’ malware used in targeted attacks on NGOs, universities</title>
      <link>https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/</link>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/</guid>
      <pubDate>Thu, 09 Apr 2026 22:04:31 GMT</pubDate>
      <source>BleepingComputer</source>
      <description>A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations and universities in Taiwan. [...]</description>
    </item>
    <item>
      <title>New VENOM phishing attacks steal senior executives&#39; Microsoft logins</title>
      <link>https://www.bleepingcomputer.com/news/security/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/</link>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/</guid>
      <pubDate>Thu, 09 Apr 2026 21:37:04 GMT</pubDate>
      <source>BleepingComputer</source>
      <description>Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called &quot;VENOM&quot; are targeting credentials of C-suite executives across multiple industries. [...]</description>
    </item>
    <item>
      <title>🏴‍☠️ Krybit has just published a new victim : megasurf.co.za</title>
      <link>https://www.ransomware.live/id/bWVnYXN1cmYuY28uemFAa3J5Yml0</link>
      <guid isPermaLink="true">https://www.ransomware.live/id/bWVnYXN1cmYuY28uemFAa3J5Yml0</guid>
      <pubDate>Thu, 09 Apr 2026 21:35:03 GMT</pubDate>
      <source>Ransomware.live RSS Feed</source>
      <description>Megasurf is an internet service provider and data center operator specializing in high-speed fibre and wireless internet...</description>
    </item>
    <item>
      <title>Healthcare IT solutions provider ChipSoft hit by ransomware attack</title>
      <link>https://www.bleepingcomputer.com/news/security/healthcare-it-solutions-provider-chipsoft-hit-by-ransomware-attack/</link>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/healthcare-it-solutions-provider-chipsoft-hit-by-ransomware-attack/</guid>
      <pubDate>Thu, 09 Apr 2026 19:46:44 GMT</pubDate>
      <source>BleepingComputer</source>
      <description>Dutch healthcare software vendor ChipSoft has been impacted by a ransomware attack that forced the company to take offline its website and digital services for patients and healthcare providers. [...]</description>
    </item>
    <item>
      <title>Google Chrome adds infostealer protection against session cookie theft</title>
      <link>https://www.bleepingcomputer.com/news/security/google-chrome-adds-infostealer-protection-against-session-cookie-theft/</link>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/google-chrome-adds-infostealer-protection-against-session-cookie-theft/</guid>
      <pubDate>Thu, 09 Apr 2026 18:33:29 GMT</pubDate>
      <source>BleepingComputer</source>
      <description>Google has rolled out Device Bound Session Credentials (DBSC) protection in Chrome 146 for Windows, designed to block info-stealing malware from harvesting session cookies. [...]</description>
    </item>
    <item>
      <title>Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet</title>
      <link>https://www.techrepublic.com/article/news-adobe-acrobat-zero-day-pdf-exploit-months/</link>
      <guid isPermaLink="true">https://www.techrepublic.com/article/news-adobe-acrobat-zero-day-pdf-exploit-months/</guid>
      <pubDate>Thu, 09 Apr 2026 18:33:04 GMT</pubDate>
      <source>Security Archives - TechRepublic</source>
      <description>A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over systems, with no patch yet available. The post Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet appeared first on TechRepublic.</description>
    </item>
    <item>
      <title>The threat hunter’s gambit</title>
      <link>https://blog.talosintelligence.com/the-threat-hunters-gambit/</link>
      <guid isPermaLink="true">https://blog.talosintelligence.com/the-threat-hunters-gambit/</guid>
      <pubDate>Thu, 09 Apr 2026 18:00:20 GMT</pubDate>
      <source>Cisco Talos Blog</source>
      <description>Bill discusses why obsessing over strategy games is actually a secret weapon to outsmart threat actors.</description>
    </item>
    <item>
      <title>EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs</title>
      <link>https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html</link>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html</guid>
      <pubDate>Thu, 09 Apr 2026 17:26:00 GMT</pubDate>
      <source>The Hacker News</source>
      <description>Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. &quot;This flaw allows apps on the same device to bypass Android security sandbox and gain...</description>
    </item>
    <item>
      <title>25K MD5 My be salt or not! pls help +++ Rep</title>
      <link>https://forum.hashkiller.io/index.php?threads/25k-md5-my-be-salt-or-not-pls-help-rep.77874/</link>
      <guid isPermaLink="true">https://forum.hashkiller.io/index.php?threads/25k-md5-my-be-salt-or-not-pls-help-rep.77874/</guid>
      <pubDate>Thu, 09 Apr 2026 17:15:32 GMT</pubDate>
      <source>Hashkiller</source>
      <description>Hello! Please help !</description>
    </item>
    <item>
      <title>Protecting Cookies with Device Bound Session Credentials</title>
      <link>http://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html</link>
      <guid isPermaLink="true">http://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html</guid>
      <pubDate>Thu, 09 Apr 2026 17:07:00 GMT</pubDate>
      <source>Google Online Security Blog</source>
      <description>Posted by Ben Ackerman, Chrome team, Daniel Rubery, Chrome team and Guillaume Ehinger, Google Account Security team Following our April 2024 announcement, Device Bound Session Credentials (DBSC) is now entering public availability for Windows users on Chrome 146, and expanding to macOS in an upcoming Chrome...</description>
    </item>
    <item>
      <title>New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts</title>
      <link>https://www.techrepublic.com/article/news-apple-iphone-scam-targeting-millions-2026/</link>
      <guid isPermaLink="true">https://www.techrepublic.com/article/news-apple-iphone-scam-targeting-millions-2026/</guid>
      <pubDate>Thu, 09 Apr 2026 15:42:25 GMT</pubDate>
      <source>Security Archives - TechRepublic</source>
      <description>Apple warns of a new scam targeting millions of iPhone users. Learn the red flags, how it works, and how to protect your account and finances. The post New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts appeared first on TechRepublic.</description>
    </item>
    <item>
      <title>Massive Data Breach Exposes 337K LAPD-Linked Records</title>
      <link>https://www.techrepublic.com/article/news-lapd-data-breach-337k-files-exposed/</link>
      <guid isPermaLink="true">https://www.techrepublic.com/article/news-lapd-data-breach-337k-files-exposed/</guid>
      <pubDate>Thu, 09 Apr 2026 15:24:43 GMT</pubDate>
      <source>Security Archives - TechRepublic</source>
      <description>A massive breach exposed 337K LAPD-linked files, raising concerns over third-party risk, sensitive data exposure, and law enforcement cybersecurity gaps. The post Massive Data Breach Exposes 337K LAPD-Linked Records appeared first on TechRepublic.</description>
    </item>
  </channel>
</rss>
