{"version":"https://jsonfeed.org/version/1.1","title":"Dragon Security Threat Intelligence Feed","home_page_url":"https://dstif.io","feed_url":"https://dstif.io/json/","next_url":"https://dstif.io/json/?next_cursor=1776203911000&sort=newest_first","description":"<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href=\"https://github.com/DragonSecurity/dstif\" rel=\"noopener noreferrer\" target=\"_blank\">https://github.com/DragonSecurity/dstif</a></p>","icon":"https://cdn.dstif.io\t/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png","favicon":"https://dstif.io/assets/default/favicon.png","authors":[{"name":"Dragon Security"}],"language":"en-us","items":[{"id":"5Dn25oCSqx8","title":"📢 Microsoft fixes bug behind Windows Server 2025 automatic upgrades","url":"https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-windows-server-2025-automatic-upgrades/?utm_source=dstif.io","content_html":"Date: 2026-04-15T10:24:53<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-windows-server-2025-automatic-upgrades/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-windows-server-2025-automatic-upgrades/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T10:24:53\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-windows-server-2025-automatic-upgrades/?utm_source=dstif.io\n","date_published":"2026-04-15T10:24:53.000Z","_microfeed":{"web_url":"https://dstif.io/i/microsoft-fixes-bug-behind-windows-server-2025-5Dn25oCSqx8/","json_url":"https://dstif.io/i/5Dn25oCSqx8/json/","rss_url":"https://dstif.io/i/5Dn25oCSqx8/rss/","guid":"5Dn25oCSqx8","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776248693000}},{"id":"ZQnN0DXT2Ox","title":"📢 UK told its Big Tech habit is now a national security risk","url":"https://go.theregister.com/feed/www.theregister.com/2026/04/15/uk_big_tech_dependence/?utm_source=dstif.io","content_html":"Date: 2026-04-15T10:15:15<br/>Source:<b> The Register Security</b><br/>Read more: <a href=https://go.theregister.com/feed/www.theregister.com/2026/04/15/uk_big_tech_dependence/?utm_source=dstif.io>https://go.theregister.com/feed/www.theregister.com/2026/04/15/uk_big_tech_dependence/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T10:15:15\nSource: The Register Security\nRead more:\nhttps://go.theregister.com/feed/www.theregister.com/2026/04/15/uk_big_tech_dependence/?utm_source=dstif.io\n","date_published":"2026-04-15T10:15:15.000Z","_microfeed":{"web_url":"https://dstif.io/i/uk-told-its-big-tech-habit-is-now-a-national-se-ZQnN0DXT2Ox/","json_url":"https://dstif.io/i/ZQnN0DXT2Ox/json/","rss_url":"https://dstif.io/i/ZQnN0DXT2Ox/rss/","guid":"ZQnN0DXT2Ox","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776248115000}},{"id":"OICJl-uAScB","title":"📢 The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought","url":"https://www.wired.com/story/deepfake-nudify-schools-global-crisis/?utm_source=dstif.io","content_html":"Date: 2026-04-15T10:00:00<br/>Source:<b> Wired Security</b><br/>Read more: <a href=https://www.wired.com/story/deepfake-nudify-schools-global-crisis/?utm_source=dstif.io>https://www.wired.com/story/deepfake-nudify-schools-global-crisis/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T10:00:00\nSource: Wired Security\nRead more:\nhttps://www.wired.com/story/deepfake-nudify-schools-global-crisis/?utm_source=dstif.io\n","date_published":"2026-04-15T10:00:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/the-deepfake-nudes-crisis-in-schools-is-much-wo-OICJl-uAScB/","json_url":"https://dstif.io/i/OICJl-uAScB/json/","rss_url":"https://dstif.io/i/OICJl-uAScB/rss/","guid":"OICJl-uAScB","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776247200000}},{"id":"5avctjAuAhB","title":"📢 April Patch Tuesday fixes two zero-days, including one under active attack","url":"https://www.malwarebytes.com/blog/news/2026/04/april-patch-tuesday-fixes-two-zero-days-including-one-under-active-attack?utm_source=dstif.io","content_html":"Date: 2026-04-15T09:57:15<br/>Source:<b> Malwarebytes Labs</b><br/>Read more: <a href=https://www.malwarebytes.com/blog/news/2026/04/april-patch-tuesday-fixes-two-zero-days-including-one-under-active-attack?utm_source=dstif.io>https://www.malwarebytes.com/blog/news/2026/04/april-patch-tuesday-fixes-two-zero-days-including-one-under-active-attack?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T09:57:15\nSource: Malwarebytes Labs\nRead more:\nhttps://www.malwarebytes.com/blog/news/2026/04/april-patch-tuesday-fixes-two-zero-days-including-one-under-active-attack?utm_source=dstif.io\n","date_published":"2026-04-15T09:57:15.000Z","_microfeed":{"web_url":"https://dstif.io/i/april-patch-tuesday-fixes-two-zero-days-includ-5avctjAuAhB/","json_url":"https://dstif.io/i/5avctjAuAhB/json/","rss_url":"https://dstif.io/i/5avctjAuAhB/rss/","guid":"5avctjAuAhB","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776247035000}},{"id":"ysZ3srVJExU","title":"📢 Credit Resources Vault: Why this credit email set off our scam alarms","url":"https://www.malwarebytes.com/blog/news/2026/04/credit-resources-vault-why-this-credit-email-set-off-our-scam-alarms?utm_source=dstif.io","content_html":"Date: 2026-04-15T09:08:47<br/>Source:<b> Malwarebytes Labs</b><br/>Read more: <a href=https://www.malwarebytes.com/blog/news/2026/04/credit-resources-vault-why-this-credit-email-set-off-our-scam-alarms?utm_source=dstif.io>https://www.malwarebytes.com/blog/news/2026/04/credit-resources-vault-why-this-credit-email-set-off-our-scam-alarms?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T09:08:47\nSource: Malwarebytes Labs\nRead more:\nhttps://www.malwarebytes.com/blog/news/2026/04/credit-resources-vault-why-this-credit-email-set-off-our-scam-alarms?utm_source=dstif.io\n","date_published":"2026-04-15T09:08:47.000Z","_microfeed":{"web_url":"https://dstif.io/i/credit-resources-vault-why-this-credit-email-s-ysZ3srVJExU/","json_url":"https://dstif.io/i/ysZ3srVJExU/json/","rss_url":"https://dstif.io/i/ysZ3srVJExU/rss/","guid":"ysZ3srVJExU","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776244127000}},{"id":"3VVoXqZhcVx","title":"📢 CVE-2026-34757 LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757?utm_source=dstif.io","content_html":"Date: 2026-04-15T08:49:16<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T08:49:16\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757?utm_source=dstif.io\n","date_published":"2026-04-15T08:49:16.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-34757-libpng-has-a-yse-after-free-in-p-3VVoXqZhcVx/","json_url":"https://dstif.io/i/3VVoXqZhcVx/json/","rss_url":"https://dstif.io/i/3VVoXqZhcVx/rss/","guid":"3VVoXqZhcVx","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776242956000}},{"id":"OOELTBqEcwS","title":"📢 CVE-2026-27140 Code execution vulnerability in SWIG code generation in cmd/go","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io","content_html":"Date: 2026-04-15T08:49:03<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T08:49:03\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io\n","date_published":"2026-04-15T08:49:03.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-27140-code-execution-vulnerability-in-OOELTBqEcwS/","json_url":"https://dstif.io/i/OOELTBqEcwS/json/","rss_url":"https://dstif.io/i/OOELTBqEcwS/rss/","guid":"OOELTBqEcwS","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776242943000}},{"id":"UIED-_0ufMG","title":"📢 CVE-2026-33055 tar-rs incorrectly ignores PAX size headers if header size is nonzero","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33055?utm_source=dstif.io","content_html":"Date: 2026-04-15T08:44:10<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33055?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33055?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T08:44:10\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33055?utm_source=dstif.io\n","date_published":"2026-04-15T08:44:10.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-33055-tar-rs-incorrectly-ignores-pax-s-UIED-_0ufMG/","json_url":"https://dstif.io/i/UIED-_0ufMG/json/","rss_url":"https://dstif.io/i/UIED-_0ufMG/rss/","guid":"UIED-_0ufMG","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776242650000}},{"id":"w15fC0bfWcC","title":"📢 CVE-2026-2646 Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2646?utm_source=dstif.io","content_html":"Date: 2026-04-15T08:43:43<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2646?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2646?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T08:43:43\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2646?utm_source=dstif.io\n","date_published":"2026-04-15T08:43:43.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-2646-heap-buffer-overflow-in-session-p-w15fC0bfWcC/","json_url":"https://dstif.io/i/w15fC0bfWcC/json/","rss_url":"https://dstif.io/i/w15fC0bfWcC/rss/","guid":"w15fC0bfWcC","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776242623000}},{"id":"bVQTrQwPuqM","title":"📢 CVE-2026-32287 Infinite loop in github.com/antchfx/xpath","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32287?utm_source=dstif.io","content_html":"Date: 2026-04-15T08:41:59<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32287?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32287?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T08:41:59\nSource: MSRC Security Updates\nRead more:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32287?utm_source=dstif.io\n","date_published":"2026-04-15T08:41:59.000Z","_microfeed":{"web_url":"https://dstif.io/i/cve-2026-32287-infinite-loop-in-githubcomantc-bVQTrQwPuqM/","json_url":"https://dstif.io/i/bVQTrQwPuqM/json/","rss_url":"https://dstif.io/i/bVQTrQwPuqM/rss/","guid":"bVQTrQwPuqM","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776242519000}},{"id":"MQ9GviJGwK7","title":"📰 Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities","url":"https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html?utm_source=dstif.io","content_html":"Date: 2026-04-15T08:40:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html?utm_source=dstif.io>https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T08:40:00\nSource: Hacker News\nRead more:\nhttps://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html?utm_source=dstif.io\n","date_published":"2026-04-15T08:40:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/microsoft-issues-patches-for-sharepoint-zero-da-MQ9GviJGwK7/","json_url":"https://dstif.io/i/MQ9GviJGwK7/json/","rss_url":"https://dstif.io/i/MQ9GviJGwK7/rss/","guid":"MQ9GviJGwK7","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776242400000}},{"id":"GwwU-BdNUqx","title":"📢 Agents hooked into GitHub can steal creds – but Anthropic, Google, and Microsoft haven't warned users","url":"https://go.theregister.com/feed/www.theregister.com/2026/04/15/claude_gemini_copilot_agents_hijacked/?utm_source=dstif.io","content_html":"Date: 2026-04-15T08:01:13<br/>Source:<b> The Register Security</b><br/>Read more: <a href=https://go.theregister.com/feed/www.theregister.com/2026/04/15/claude_gemini_copilot_agents_hijacked/?utm_source=dstif.io>https://go.theregister.com/feed/www.theregister.com/2026/04/15/claude_gemini_copilot_agents_hijacked/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T08:01:13\nSource: The Register Security\nRead more:\nhttps://go.theregister.com/feed/www.theregister.com/2026/04/15/claude_gemini_copilot_agents_hijacked/?utm_source=dstif.io\n","date_published":"2026-04-15T08:01:13.000Z","_microfeed":{"web_url":"https://dstif.io/i/agents-hooked-into-github-can-steal-creds-but-GwwU-BdNUqx/","json_url":"https://dstif.io/i/GwwU-BdNUqx/json/","rss_url":"https://dstif.io/i/GwwU-BdNUqx/rss/","guid":"GwwU-BdNUqx","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776240073000}},{"id":"kYRkeiX9lMa","title":"📰 OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams","url":"https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html?utm_source=dstif.io","content_html":"Date: 2026-04-15T04:30:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html?utm_source=dstif.io>https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T04:30:00\nSource: Hacker News\nRead more:\nhttps://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html?utm_source=dstif.io\n","date_published":"2026-04-15T04:30:00.000Z","_microfeed":{"web_url":"https://dstif.io/i/openai-launches-gpt-54-cyber-with-expanded-acc-kYRkeiX9lMa/","json_url":"https://dstif.io/i/kYRkeiX9lMa/json/","rss_url":"https://dstif.io/i/kYRkeiX9lMa/rss/","guid":"kYRkeiX9lMa","status":"published","date_published_short":"Wed Apr 15 2026","date_published_ms":1776227400000}},{"id":"NFiIAJeiZh-","title":"📢 ISC Stormcast For Wednesday, April 15th, 2026 https://isc.sans.edu/podcastdetail/9892, (Wed, Apr 15th)","url":"https://isc.sans.edu/diary/rss/32900?utm_source=dstif.io","content_html":"Date: 2026-04-15T02:00:02<br/>Source:<b> SANS Internet Storm Center</b><br/>Read more: <a href=https://isc.sans.edu/diary/rss/32900?utm_source=dstif.io>https://isc.sans.edu/diary/rss/32900?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T02:00:02\nSource: SANS Internet Storm Center\nRead more: https://isc.sans.edu/diary/rss/32900?utm_source=dstif.io\n","date_published":"2026-04-15T02:00:02.000Z","_microfeed":{"web_url":"https://dstif.io/i/isc-stormcast-for-wednesday-april-15th-2026-h-NFiIAJeiZh-/","json_url":"https://dstif.io/i/NFiIAJeiZh-/json/","rss_url":"https://dstif.io/i/NFiIAJeiZh-/rss/","guid":"NFiIAJeiZh-","status":"published","date_published_short":"Tue Apr 14 2026","date_published_ms":1776218402000}},{"id":"CXU7myFKRz3","title":"📢 Scanning for AI Models, (Tue, Apr 14th)","url":"https://isc.sans.edu/diary/rss/32896?utm_source=dstif.io","content_html":"Date: 2026-04-15T00:19:53<br/>Source:<b> SANS Internet Storm Center</b><br/>Read more: <a href=https://isc.sans.edu/diary/rss/32896?utm_source=dstif.io>https://isc.sans.edu/diary/rss/32896?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-15T00:19:53\nSource: SANS Internet Storm Center\nRead more: https://isc.sans.edu/diary/rss/32896?utm_source=dstif.io\n","date_published":"2026-04-15T00:19:53.000Z","_microfeed":{"web_url":"https://dstif.io/i/scanning-for-ai-models-tue-apr-14th-CXU7myFKRz3/","json_url":"https://dstif.io/i/CXU7myFKRz3/json/","rss_url":"https://dstif.io/i/CXU7myFKRz3/rss/","guid":"CXU7myFKRz3","status":"published","date_published_short":"Tue Apr 14 2026","date_published_ms":1776212393000}},{"id":"tgFvkyMBsq4","title":"📢 Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack","url":"https://www.sentinelone.com/blog/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/?utm_source=dstif.io","content_html":"Date: 2026-04-14T22:59:27<br/>Source:<b> SentinelOne</b><br/>Read more: <a href=https://www.sentinelone.com/blog/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/?utm_source=dstif.io>https://www.sentinelone.com/blog/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-14T22:59:27\nSource: SentinelOne\nRead more:\nhttps://www.sentinelone.com/blog/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/?utm_source=dstif.io\n","date_published":"2026-04-14T22:59:27.000Z","_microfeed":{"web_url":"https://dstif.io/i/securing-the-software-supply-chain-how-sentine-tgFvkyMBsq4/","json_url":"https://dstif.io/i/tgFvkyMBsq4/json/","rss_url":"https://dstif.io/i/tgFvkyMBsq4/rss/","guid":"tgFvkyMBsq4","status":"published","date_published_short":"Tue Apr 14 2026","date_published_ms":1776207567000}},{"id":"IzWGkHgTlNg","title":"📢 Ukraine’s military robot surge aims to offset drone risks to humans","url":"https://arstechnica.com/ai/2026/04/ukraines-military-robot-surge-aims-to-offset-drone-risks-to-humans/?utm_source=dstif.io","content_html":"Date: 2026-04-14T22:42:22<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/ai/2026/04/ukraines-military-robot-surge-aims-to-offset-drone-risks-to-humans/?utm_source=dstif.io>https://arstechnica.com/ai/2026/04/ukraines-military-robot-surge-aims-to-offset-drone-risks-to-humans/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-14T22:42:22\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/ai/2026/04/ukraines-military-robot-surge-aims-to-offset-drone-risks-to-humans/?utm_source=dstif.io\n","date_published":"2026-04-14T22:42:22.000Z","_microfeed":{"web_url":"https://dstif.io/i/ukraines-military-robot-surge-aims-to-offset-d-IzWGkHgTlNg/","json_url":"https://dstif.io/i/IzWGkHgTlNg/json/","rss_url":"https://dstif.io/i/IzWGkHgTlNg/rss/","guid":"IzWGkHgTlNg","status":"published","date_published_short":"Tue Apr 14 2026","date_published_ms":1776206542000}},{"id":"8IpmHN_V9ik","title":"📢 Microsoft adds Windows protections for malicious Remote Desktop files","url":"https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-windows-protections-for-malicious-remote-desktop-files/?utm_source=dstif.io","content_html":"Date: 2026-04-14T22:23:33<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-windows-protections-for-malicious-remote-desktop-files/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-windows-protections-for-malicious-remote-desktop-files/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-14T22:23:33\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/microsoft/microsoft-adds-windows-protections-for-malicious-remote-desktop-files/?utm_source=dstif.io\n","date_published":"2026-04-14T22:23:33.000Z","_microfeed":{"web_url":"https://dstif.io/i/microsoft-adds-windows-protections-for-maliciou-8IpmHN_V9ik/","json_url":"https://dstif.io/i/8IpmHN_V9ik/json/","rss_url":"https://dstif.io/i/8IpmHN_V9ik/rss/","guid":"8IpmHN_V9ik","status":"published","date_published_short":"Tue Apr 14 2026","date_published_ms":1776205413000}},{"id":"8OhvCLK2qmV","title":"📢 Sony killing features for antenna, set-top box users of Bravia smart TVs in May","url":"https://arstechnica.com/gadgets/2026/04/sony-killing-features-for-antenna-set-top-box-users-of-bravia-smart-tvs-in-may/?utm_source=dstif.io","content_html":"Date: 2026-04-14T22:00:31<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/gadgets/2026/04/sony-killing-features-for-antenna-set-top-box-users-of-bravia-smart-tvs-in-may/?utm_source=dstif.io>https://arstechnica.com/gadgets/2026/04/sony-killing-features-for-antenna-set-top-box-users-of-bravia-smart-tvs-in-may/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-14T22:00:31\nSource: Ars Technica Security\nRead more:\nhttps://arstechnica.com/gadgets/2026/04/sony-killing-features-for-antenna-set-top-box-users-of-bravia-smart-tvs-in-may/?utm_source=dstif.io\n","date_published":"2026-04-14T22:00:31.000Z","_microfeed":{"web_url":"https://dstif.io/i/sony-killing-features-for-antenna-set-top-box-8OhvCLK2qmV/","json_url":"https://dstif.io/i/8OhvCLK2qmV/json/","rss_url":"https://dstif.io/i/8OhvCLK2qmV/rss/","guid":"8OhvCLK2qmV","status":"published","date_published_short":"Tue Apr 14 2026","date_published_ms":1776204031000}},{"id":"otkJWID-VAQ","title":"📢 Crypto-exchange Kraken extorted by hackers after insider breach","url":"https://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/?utm_source=dstif.io","content_html":"Date: 2026-04-14T21:58:31<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/?utm_source=dstif.io</a><br/>","content_text":"Date: 2026-04-14T21:58:31\nSource: BleepingComputer\nRead more:\nhttps://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/?utm_source=dstif.io\n","date_published":"2026-04-14T21:58:31.000Z","_microfeed":{"web_url":"https://dstif.io/i/crypto-exchange-kraken-extorted-by-hackers-afte-otkJWID-VAQ/","json_url":"https://dstif.io/i/otkJWID-VAQ/json/","rss_url":"https://dstif.io/i/otkJWID-VAQ/rss/","guid":"otkJWID-VAQ","status":"published","date_published_short":"Tue Apr 14 2026","date_published_ms":1776203911000}}],"_microfeed":{"microfeed_version":"0.1.5","base_url":"https://dstif.io","categories":[{"name":"Business"},{"name":"Technology"}],"subscribe_methods":[{"name":"RSS","type":"rss","url":"https://dstif.io/rss/","image":"https://dstif.io/assets/brands/subscribe/rss.png","enabled":true,"editable":false,"id":"NtQvlJdq8M0"},{"name":"JSON","type":"json","url":"https://dstif.io/json/","image":"https://dstif.io/assets/brands/subscribe/json.png","enabled":true,"editable":false,"id":"N1TIyFiPgia"}],"description_text":"The Dragon Security Threat Intelligence Feed project compiles a diverse set of\nRSS feeds from reputable sources in cybersecurity, threat intelligence,\ntechnology news, and other institutions. These feeds are intended for security\nprofessionals, researchers, and enthusiasts to stay informed on the latest\nsecurity threats, vulnerabilities, industry trends, economic indicators, and\npolicy changes.\n\n\n\n\nWe provide this service free of charge to promote the common knowledge of cyber\nand security.\n\n\n\n\nPlease be aware that the feed aggregator is an automated bot, and sometimes\nduplication happens. We apologise for it in advance. Should you wish to report\nany issues, such as duplication, or wish to request additional feeds be added to\nthe aggregator, please let us know by opening an issue on\nhttps://github.com/DragonSecurity/dstif","copyright":"©2024 Dragon Security","itunes:type":"episodic","items_sort_order":"newest_first","items_next_cursor":1776203911000,"next_url":"https://dstif.io/json/?next_cursor=1776203911000&sort=newest_first"}}