<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/rss/stylesheet/" type="text/xsl"?>
<rss xmlns:content='http://purl.org/rss/1.0/modules/content/' xmlns:taxo='http://purl.org/rss/1.0/modules/taxonomy/' xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#' xmlns:itunes='http://www.itunes.com/dtds/podcast-1.0.dtd' xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:atom='http://www.w3.org/2005/Atom' xmlns:podbridge='http://www.podbridge.com/podbridge-ad.dtd' version='2.0'>
<channel>
  <title>Dragon Security Threat Intelligence Feed</title>
  <language>en-us</language>
  <generator>microfeed.org</generator>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <atom:link rel="self" href="https://dstif.io/rss/" type="application/rss+xml"/>
  <link>https://dstif.io</link>
  <link rel="next" href="https://dstif.io/rss/?next_cursor=1775867517000&amp;sort=newest_first" type="application/rss+xml"/>
  <description>
    <![CDATA[<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href="https://github.com/DragonSecurity/dstif" rel="noopener noreferrer" target="_blank">https://github.com/DragonSecurity/dstif</a></p>]]>
  </description>
  <itunes:author>Dragon Security</itunes:author>
  <itunes:image href="https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png"/>
  <image>
    <title>Dragon Security Threat Intelligence Feed</title>
    <url>https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png</url>
    <link>https://dstif.io</link>
  </image>
  <copyright>©2024 Dragon Security</copyright>
  <itunes:category text="Business"/>
  <itunes:category text="Technology"/>
  <item>
    <title>📢 Over 20,000 crypto fraud victims identified in international crackdown</title>
    <guid>sXz4aHIPoje</guid>
    <pubDate>Sat, 11 Apr 2026 14:20:40 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T14:20:40<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Brockton Hospital still dealing with aftermath of ransomware attack</title>
    <guid>HOJOt3i4r1R</guid>
    <pubDate>Sat, 11 Apr 2026 11:50:23 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T11:50:23<br/>Source:<b> DataBreaches.net</b><br/>Read more: <a href=https://databreaches.net/2026/04/11/brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack/?pk_campaign=feed&pk_kwd=brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack?utm_source=dstif.io>https://databreaches.net/2026/04/11/brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack/?pk_campaign=feed&pk_kwd=brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://databreaches.net/2026/04/11/brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack/?pk_campaign=feed&amp;pk_kwd=brockton-hospital-still-dealing-with-aftermath-of-ransomware-attack?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 AI models are terrible at betting on soccer—especially xAI Grok</title>
    <guid>to11nRP5XRX</guid>
    <pubDate>Sat, 11 Apr 2026 11:15:17 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T11:15:17<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/ai/2026/04/ai-models-are-terrible-at-betting-on-soccer-especially-xai-grok/?utm_source=dstif.io>https://arstechnica.com/ai/2026/04/ai-models-are-terrible-at-betting-on-soccer-especially-xai-grok/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://arstechnica.com/ai/2026/04/ai-models-are-terrible-at-betting-on-soccer-especially-xai-grok/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise</title>
    <guid>dsRO_qwcMlK</guid>
    <pubDate>Sat, 11 Apr 2026 11:11:09 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T11:11:09<br/>Source:<b> The Register Security</b><br/>Read more: <a href=https://go.theregister.com/feed/www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/?utm_source=dstif.io>https://go.theregister.com/feed/www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://go.theregister.com/feed/www.theregister.com/2026/04/11/trivy_axios_supply_chain_attacks/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Your Push Notifications Aren’t Safe From the FBI</title>
    <guid>jrdnd57Hxcb</guid>
    <pubDate>Sat, 11 Apr 2026 10:30:00 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T10:30:00<br/>Source:<b> Wired Security</b><br/>Read more: <a href=https://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/?utm_source=dstif.io>https://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://www.wired.com/story/security-news-this-week-your-push-notifications-arent-safe-from-the-fbi/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 How the Internet Broke Everyone’s Bullshit Detectors</title>
    <guid>L-BUD7jEm62</guid>
    <pubDate>Sat, 11 Apr 2026 09:30:00 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T09:30:00<br/>Source:<b> Wired Security</b><br/>Read more: <a href=https://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/?utm_source=dstif.io>https://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://www.wired.com/story/how-the-internet-broke-everyones-bullshit-detectors/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 CVE-2026-39881 Vim Ex command injection in Vims NetBeans integration</title>
    <guid>SDqSH6-YTH2</guid>
    <pubDate>Sat, 11 Apr 2026 08:40:57 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T08:40:57<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-39881?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Hungarian government creds left in the safe hands of &apos;FrankLampard&apos;</title>
    <guid>bH4XLyDMyH8</guid>
    <pubDate>Sat, 11 Apr 2026 08:30:14 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T08:30:14<br/>Source:<b> The Register Security</b><br/>Read more: <a href=https://go.theregister.com/feed/www.theregister.com/2026/04/11/hungary_government_logins_breach/?utm_source=dstif.io>https://go.theregister.com/feed/www.theregister.com/2026/04/11/hungary_government_logins_breach/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://go.theregister.com/feed/www.theregister.com/2026/04/11/hungary_government_logins_breach/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 CVE-2026-27140 Code execution vulnerability in SWIG code generation in cmd/go</title>
    <guid>wCN8XiKH9sr</guid>
    <pubDate>Sat, 11 Apr 2026 08:10:08 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T08:10:08<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27140?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📰 Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data</title>
    <guid>7PXsL_K1iu6</guid>
    <pubDate>Sat, 11 Apr 2026 06:02:00 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T06:02:00<br/>Source:<b> Hacker News</b><br/>Read more: <a href=https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html?utm_source=dstif.io>https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 The Artemis II mission has ended. Where does NASA go from here?</title>
    <guid>TUrLjfBjgPp</guid>
    <pubDate>Sat, 11 Apr 2026 03:24:21 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T03:24:21<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/space/2026/04/the-artemis-ii-mission-has-ended-where-does-nasa-go-from-here/?utm_source=dstif.io>https://arstechnica.com/space/2026/04/the-artemis-ii-mission-has-ended-where-does-nasa-go-from-here/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://arstechnica.com/space/2026/04/the-artemis-ii-mission-has-ended-where-does-nasa-go-from-here/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 ChatGPT rolls out new $100 Pro subscription to challenge Claude</title>
    <guid>rbHjIgDbev6</guid>
    <pubDate>Sat, 11 Apr 2026 02:08:16 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T02:08:16<br/>Source:<b> BleepingComputer</b><br/>Read more: <a href=https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude/?utm_source=dstif.io>https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-rolls-out-new-100-pro-subscription-to-challenge-claude/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Medusa Ransomware Attack</title>
    <guid>rYSZ5TBytKL</guid>
    <pubDate>Sat, 11 Apr 2026 01:25:49 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T01:25:49<br/>Source:<b> FortiGuard Threat Signal</b><br/>Read more: <a href=https://fortiguard.fortinet.com/threat-signal-report/6398?utm_source=dstif.io>https://fortiguard.fortinet.com/threat-signal-report/6398?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://fortiguard.fortinet.com/threat-signal-report/6398?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Four astronauts are back home after a daring ride around the Moon</title>
    <guid>L1kF615i1wC</guid>
    <pubDate>Sat, 11 Apr 2026 01:21:10 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T01:21:10<br/>Source:<b> Ars Technica Security</b><br/>Read more: <a href=https://arstechnica.com/space/2026/04/four-astronauts-are-back-home-after-a-daring-ride-around-the-moon/?utm_source=dstif.io>https://arstechnica.com/space/2026/04/four-astronauts-are-back-home-after-a-daring-ride-around-the-moon/?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://arstechnica.com/space/2026/04/four-astronauts-are-back-home-after-a-daring-ride-around-the-moon/?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Chromium: CVE-2026-5919 Insufficient validation of untrusted input in WebSockets</title>
    <guid>Jq56BBSzCGN</guid>
    <pubDate>Sat, 11 Apr 2026 00:32:06 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T00:32:06<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Chromium: CVE-2026-5915 Insufficient validation of untrusted input in WebML</title>
    <guid>RiqM437RBbs</guid>
    <pubDate>Sat, 11 Apr 2026 00:32:04 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T00:32:04<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5915?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5915?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5915?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Chromium: CVE-2026-5914 Type Confusion in CSS</title>
    <guid>9ER9Ougw4A5</guid>
    <pubDate>Sat, 11 Apr 2026 00:32:03 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T00:32:03<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5914?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5914?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5914?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Chromium: CVE-2026-5912 Integer overflow in WebRTC</title>
    <guid>CuZDFv5UUOJ</guid>
    <pubDate>Sat, 11 Apr 2026 00:32:01 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T00:32:01<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5912?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5912?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5912?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Chromium: CVE-2026-5910 Integer overflow in Media</title>
    <guid>BCR3rIA8lj_</guid>
    <pubDate>Sat, 11 Apr 2026 00:31:59 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T00:31:59<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5910?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5910?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5910?utm_source=dstif.io</link>
  </item>
  <item>
    <title>📢 Chromium: CVE-2026-5908 Integer overflow in Media</title>
    <guid>S2m2-kjwBPu</guid>
    <pubDate>Sat, 11 Apr 2026 00:31:57 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-04-11T00:31:57<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5908?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5908?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5908?utm_source=dstif.io</link>
  </item>
</channel>
</rss>