{"exported_at":"2026-04-10T23:37:31.830Z","count":80,"iocs":[{"type":"cve","value":"CVE-2026-34040","source":"CSO Online","article_title":"Old Docker authorization bypass pops up despite previous patch","article_url":"https://www.csoonline.com/article/4157405/old-docker-authorization-bypass-pops-up-despite-previous-patch.html","published_at":"2026-04-10T18:50:59.000Z"},{"type":"cve","value":"CVE-2025-59145","source":"GBHackers","article_title":"Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data","article_url":"https://gbhackers.com/hackers-exploit-github-copilot-flaw/","published_at":"2026-04-10T13:02:12.000Z"},{"type":"cve","value":"CVE-2026-23818","source":"GBHackers","article_title":"HPE Aruba Private 5G Vulnerability Opens Door to Credential Theft Attacks","article_url":"https://gbhackers.com/hpe-aruba-private-5g-vulnerability/","published_at":"2026-04-10T09:07:39.000Z"},{"type":"cve","value":"CVE-2026-39987","source":"The Hacker News","article_title":"Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure","article_url":"https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html","published_at":"2026-04-10T07:37:00.000Z"},{"type":"cve","value":"CVE-2026-23869","source":"GBHackers","article_title":"New React Server Components Flaw Could Let Attackers Trigger DoS","article_url":"https://gbhackers.com/new-react-server-components-flaw/","published_at":"2026-04-10T07:30:33.000Z"},{"type":"cve","value":"CVE-2026-33784","source":"GBHackers","article_title":"Juniper Networks Default Credential Vulnerability Allows Unauthorized Full Access","article_url":"https://gbhackers.com/juniper-networks-default-credential-vulnerability/","published_at":"2026-04-10T06:48:17.000Z"},{"type":"domain","value":"shutterstock.com","source":"CSO Online","article_title":"Was CISOs von Moschusochsen lernen können","article_url":"https://www.csoonline.com/article/3558811/was-cisos-von-moschusochsen-lernen-konnen.html","published_at":"2026-04-10T03:00:00.000Z"},{"type":"domain","value":"crates.io","source":"SC Media","article_title":"Contagious Interview campaign expands further","article_url":"https://www.scworld.com/brief/contagious-interview-campaign-expands-further","published_at":"2026-04-09T20:55:32.000Z"},{"type":"cve","value":"CVE-2026-21509","source":"SC Media","article_title":"APT28 deploys PRISMEX malware in espionage campaign against Ukraine and allies","article_url":"https://www.scworld.com/brief/apt28-deploys-prismex-malware-in-espionage-campaign-against-ukraine-and-allies","published_at":"2026-04-09T20:41:34.000Z"},{"type":"cve","value":"CVE-2026-21513","source":"SC Media","article_title":"APT28 deploys PRISMEX malware in espionage campaign against Ukraine and allies","article_url":"https://www.scworld.com/brief/apt28-deploys-prismex-malware-in-espionage-campaign-against-ukraine-and-allies","published_at":"2026-04-09T20:41:34.000Z"},{"type":"cve","value":"CVE-2026-34197","source":"Help Net Security","article_title":"Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)","article_url":"https://www.helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/","published_at":"2026-04-09T13:04:54.000Z"},{"type":"domain","value":"storage.googleapis.com","source":"GBHackers","article_title":"New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT","article_url":"https://gbhackers.com/phishing-campaign-exploits-google/","published_at":"2026-04-09T12:15:07.000Z"},{"type":"cve","value":"CVE-2025-13926","source":"CISA Advisories","article_title":"Contemporary Controls BASC 20T","article_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-099-01","published_at":"2026-04-09T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-20160","source":"GBHackers","article_title":"Technical Details Released for Critical Cisco SSM Command Execution Vulnerability","article_url":"https://gbhackers.com/technical-details-critical-cisco-ssm-command-execution-vulnerability/","published_at":"2026-04-09T11:24:22.000Z"},{"type":"cve","value":"CVE-2026-1340","source":"GBHackers","article_title":"CISA Issues Warning on Critical Ivanti EPMM Flaw Exploited in Ongoing Attacks","article_url":"https://gbhackers.com/cisa-issues-warning-on-critical-ivanti-epmm-flaw/","published_at":"2026-04-09T08:32:02.000Z"},{"type":"cve","value":"CVE-2026-0234","source":"GBHackers","article_title":"Palo Alto Cortex XSOAR Flaw in Microsoft Teams Integration Lets Attackers Access Data","article_url":"https://gbhackers.com/palo-alto-cortex-xsoar-flaw-in-microsoft-teams-integration/","published_at":"2026-04-09T05:38:47.000Z"},{"type":"domain","value":"gitlab.com","source":"GBHackers","article_title":"GitLab Addresses Multiple Vulnerabilities Linked to DoS and Code Injection","article_url":"https://gbhackers.com/gitlab-addresses-multiple-vulnerabilities/","published_at":"2026-04-09T05:05:49.000Z"},{"type":"domain","value":"facebookmail.com","source":"GBHackers","article_title":"Meta Business Alerts Abused for Phishing Campaigns","article_url":"https://gbhackers.com/meta-business-alerts/","published_at":"2026-04-09T04:55:28.000Z"},{"type":"domain","value":"shutterstock.com","source":"CSO Online","article_title":"So geht Post-Incident Review","article_url":"https://www.csoonline.com/article/4013155/so-geht-post-incident-review.html","published_at":"2026-04-09T03:35:00.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9886,","source":"SANS ISC","article_title":"ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)","article_url":"https://isc.sans.edu/diary/rss/32882","published_at":"2026-04-09T02:00:03.000Z"},{"type":"cve","value":"CVE-2026-1340","source":"Security Affairs","article_title":"U.S. CISA adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog","article_url":"https://securityaffairs.com/190519/security/u-s-cisa-adds-a-flaw-in-ivanti-epmm-to-its-known-exploited-vulnerabilities-catalog-2.html","published_at":"2026-04-08T21:35:09.000Z"},{"type":"cve","value":"CVE-2025-59718","source":"Rapid7 Blog","article_title":"FortiGate CVE-2025-59718 Exploitation: Incident Response Findings","article_url":"https://www.rapid7.com/blog/post/ve-fortigate-cve-2025-59718-exploitation-incident-response-ir-findings","published_at":"2026-04-08T13:39:52.000Z"},{"type":"cve","value":"CVE-2026-1340","source":"CISA Advisories","article_title":"CISA Adds One Known Exploited Vulnerability to Catalog","article_url":"https://www.cisa.gov/news-events/alerts/2026/04/08/cisa-adds-one-known-exploited-vulnerability-catalog","published_at":"2026-04-08T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-31790","source":"GBHackers","article_title":"Multiple OpenSSL Flaws Expose Sensitive Data in RSA KEM Handling","article_url":"https://gbhackers.com/multiple-openssl-flaws-expose-sensitive-data/","published_at":"2026-04-08T09:04:05.000Z"},{"type":"cve","value":"CVE-2026-34040","source":"GBHackers","article_title":"Docker Authorization Bypass Flaw Exposed Hosts to Potential Attackers","article_url":"https://gbhackers.com/docker-authorization-bypass-flaw/","published_at":"2026-04-08T08:47:49.000Z"},{"type":"cve","value":"CVE-2026-34078","source":"Help Net Security","article_title":"Flatpak 1.16.4 fixes sandbox escape and three other security flaws","article_url":"https://www.helpnetsecurity.com/2026/04/08/flatpak-1-16-4-released-fixes-sandbox-escape/","published_at":"2026-04-08T08:32:30.000Z"},{"type":"cve","value":"CVE-2026-34079","source":"Help Net Security","article_title":"Flatpak 1.16.4 fixes sandbox escape and three other security flaws","article_url":"https://www.helpnetsecurity.com/2026/04/08/flatpak-1-16-4-released-fixes-sandbox-escape/","published_at":"2026-04-08T08:32:30.000Z"},{"type":"cve","value":"CVE-2026-34197","source":"GBHackers","article_title":"Claude Identifies Critical 13-Year-Old RCE Vulnerability in Apache ActiveMQ","article_url":"https://gbhackers.com/claude-identifies-critical-13-year-old-rce-vulnerability-in-apache-activemq/","published_at":"2026-04-08T05:13:38.000Z"},{"type":"cve","value":"CVE-2026-31790","source":"Help Net Security","article_title":"OpenSSL 3.6.2 lands with eight CVE fixes","article_url":"https://www.helpnetsecurity.com/2026/04/08/openssl-3-6-2-security-patch/","published_at":"2026-04-08T04:43:43.000Z"},{"type":"cve","value":"CVE-2026-2673","source":"Help Net Security","article_title":"OpenSSL 3.6.2 lands with eight CVE fixes","article_url":"https://www.helpnetsecurity.com/2026/04/08/openssl-3-6-2-security-patch/","published_at":"2026-04-08T04:43:43.000Z"},{"type":"cve","value":"CVE-2026-28386","source":"Help Net Security","article_title":"OpenSSL 3.6.2 lands with eight CVE fixes","article_url":"https://www.helpnetsecurity.com/2026/04/08/openssl-3-6-2-security-patch/","published_at":"2026-04-08T04:43:43.000Z"},{"type":"domain","value":"shutterstock.com","source":"CSO Online","article_title":"Tipps für CISOs, die die Branche wechseln wollen","article_url":"https://www.csoonline.com/article/4090067/tipps-fur-cisos-die-die-branche-wechseln-wollen.html","published_at":"2026-04-08T04:00:00.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9884,","source":"SANS ISC","article_title":"ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)","article_url":"https://isc.sans.edu/diary/rss/32876","published_at":"2026-04-08T02:00:02.000Z"},{"type":"cve","value":"CVE-2025-59528","source":"SC Media","article_title":"Active exploitation of max severity Flowise bug threatens broad compromise","article_url":"https://www.scworld.com/brief/active-exploitation-of-max-severity-flowise-bug-threatens-broad-compromise","published_at":"2026-04-07T21:18:51.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"SC Media","article_title":"Immediate remediation of Fortinet FortiClient EMS bug ordered by CISA","article_url":"https://www.scworld.com/brief/immediate-remediation-of-fortinet-forticlient-ems-bug-ordered-by-cisa","published_at":"2026-04-07T21:16:52.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"CSO Online","article_title":"Fortinet releases emergency hotfix for FortiClient EMS zero-day flaw","article_url":"https://www.csoonline.com/article/4155221/fortinet-releases-emergency-hotfix-for-forticlient-ems-zero-day-flaw.html","published_at":"2026-04-07T20:37:09.000Z"},{"type":"cve","value":"CVE-2025-59528","source":"Security Affairs","article_title":"Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution","article_url":"https://securityaffairs.com/190471/security/attackers-exploit-critical-flowise-flaw-cve-2025-59528-for-remote-code-execution.html","published_at":"2026-04-07T20:16:05.000Z"},{"type":"cve","value":"CVE-2025-59528","source":"BleepingComputer","article_title":"Max severity Flowise RCE vulnerability now exploited in attacks","article_url":"https://www.bleepingcomputer.com/news/security/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/","published_at":"2026-04-07T17:02:05.000Z"},{"type":"cve","value":"CVE-2026-34040","source":"The Hacker News","article_title":"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access","article_url":"https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html","published_at":"2026-04-07T15:15:00.000Z"},{"type":"cve","value":"CVE-2024-41110","source":"The Hacker News","article_title":"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access","article_url":"https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html","published_at":"2026-04-07T15:15:00.000Z"},{"type":"cve","value":"CVE-2025-14815","source":"CISA Advisories","article_title":"Mitsubishi Electric GENESIS64 and ICONICS Suite products","article_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-097-01","published_at":"2026-04-07T12:00:00.000Z"},{"type":"cve","value":"CVE-2025-14816","source":"CISA Advisories","article_title":"Mitsubishi Electric GENESIS64 and ICONICS Suite products","article_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-097-01","published_at":"2026-04-07T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"Security Affairs","article_title":"U.S. CISA adds a flaw in Fortinet FortiClient EMS to its Known Exploited Vulnerabilities catalog","article_url":"https://securityaffairs.com/190425/security/u-s-cisa-adds-a-flaw-in-fortinet-forticlient-ems-to-its-known-exploited-vulnerabilities-catalog.html","published_at":"2026-04-07T08:59:09.000Z"},{"type":"cve","value":"CVE-2025-59528","source":"GBHackers","article_title":"Attackers Exploit Flowise Injection Vulnerability as 15,000+ Instances Remain Exposed","article_url":"https://gbhackers.com/attackers-exploit-flowise-injection-vulnerability/","published_at":"2026-04-07T08:43:06.000Z"},{"type":"cve","value":"CVE-2025-59528","source":"The Hacker News","article_title":"Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed","article_url":"https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html","published_at":"2026-04-07T05:56:00.000Z"},{"type":"cve","value":"CVE-2026-0740","source":"GBHackers","article_title":"50,000 WordPress Sites Running Ninja Forms Vulnerable to Critical File Upload RCE","article_url":"https://gbhackers.com/50000-sites-running-ninja-forms-vulnerable/","published_at":"2026-04-07T05:43:37.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9882,","source":"SANS ISC","article_title":"ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)","article_url":"https://isc.sans.edu/diary/rss/32872","published_at":"2026-04-07T02:00:02.000Z"},{"type":"domain","value":"outlook.com","source":"BleepingComputer","article_title":"Microsoft fixes Classic Outlook bug causing email delivery issues","article_url":"https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues/","published_at":"2026-04-06T19:19:24.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"Tenable Blog","article_title":"CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild","article_url":"https://www.tenable.com/blog/cve-2026-35616-fortinet-forticlientems-improper-access-control-vulnerability-exploited-in-the","published_at":"2026-04-06T14:21:05.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"Security Affairs","article_title":"Attackers Exploit RCE Flaw as 14,000 F5 BIG-IP APM Instances Remain Exposed","article_url":"https://securityaffairs.com/190384/security/attackers-exploit-rce-flaw-as-14000-f5-big-ip-apm-instances-remain-exposed.html","published_at":"2026-04-06T13:07:25.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"CISA Advisories","article_title":"CISA Adds One Known Exploited Vulnerability to Catalog","article_url":"https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog","published_at":"2026-04-06T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-34976","source":"GBHackers","article_title":"Critical Dgraph Database Flaw Allowed Attackers to Bypass Authentication","article_url":"https://gbhackers.com/critical-dgraph-database-flaw/","published_at":"2026-04-06T07:56:19.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"GBHackers","article_title":"2,000+ FortiClient EMS Instances Exposed Online as Attackers Exploit Active RCE Flaw","article_url":"https://gbhackers.com/2000-forticlient-ems-instances-exposed-online/","published_at":"2026-04-06T05:18:04.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"Security Affairs","article_title":"CVE-2026-35616: Fortinet fixes actively exploited high-severity flaw","article_url":"https://securityaffairs.com/190392/hacking/cve-2026-35616-fortinet-fixes-actively-exploited-high-severity-flaw.html","published_at":"2026-04-06T05:10:29.000Z"},{"type":"cve","value":"CVE-2026-5494","source":"Zero Day Initiative","article_title":"ZDI-26-256: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-256/","published_at":"2026-04-06T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5493","source":"Zero Day Initiative","article_title":"ZDI-26-255: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-255/","published_at":"2026-04-06T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5496","source":"Zero Day Initiative","article_title":"ZDI-26-254: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-254/","published_at":"2026-04-06T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5495","source":"Zero Day Initiative","article_title":"ZDI-26-257: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-257/","published_at":"2026-04-06T05:00:00.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9880,","source":"SANS ISC","article_title":"ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)","article_url":"https://isc.sans.edu/diary/rss/32868","published_at":"2026-04-06T02:00:02.000Z"},{"type":"domain","value":"asp.net","source":"Exploit Database","article_title":"[webapps] ASP.net  8.0.10 - Bypass","article_url":"https://www.exploit-db.com/exploits/52492","published_at":"2026-04-06T00:00:00.000Z"},{"type":"cve","value":"CVE-2025-55182","source":"BleepingComputer","article_title":"Hackers exploit React2Shell in automated credential theft campaign","article_url":"https://www.bleepingcomputer.com/news/security/hackers-exploit-react2shell-in-automated-credential-theft-campaign/","published_at":"2026-04-05T14:17:23.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"The Hacker News","article_title":"Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS","article_url":"https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html","published_at":"2026-04-05T04:32:00.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"Security Affairs","article_title":"U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog","article_url":"https://securityaffairs.com/190341/security/u-s-cisa-adds-a-flaw-in-trueconf-client-to-its-known-exploited-vulnerabilities-catalog.html","published_at":"2026-04-04T16:42:38.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"Help Net Security","article_title":"FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)","article_url":"https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/","published_at":"2026-04-04T14:09:54.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"CSO Online","article_title":"Google patches fourth Chrome zero-day so far this year","article_url":"https://www.csoonline.com/article/4154235/google-patches-fourth-chrome-zero-day-so-far-this-year.html","published_at":"2026-04-03T17:29:30.000Z"},{"type":"cve","value":"CVE-2026-2699","source":"SC Media","article_title":"Progress ShareFile vulnerabilities allow unauthenticated file exfiltration","article_url":"https://www.scworld.com/brief/progress-sharefile-vulnerabilities-allow-unauthenticated-file-exfiltration","published_at":"2026-04-03T15:17:56.000Z"},{"type":"cve","value":"CVE-2026-2701","source":"SC Media","article_title":"Progress ShareFile vulnerabilities allow unauthenticated file exfiltration","article_url":"https://www.scworld.com/brief/progress-sharefile-vulnerabilities-allow-unauthenticated-file-exfiltration","published_at":"2026-04-03T15:17:56.000Z"},{"type":"cve","value":"CVE-2026-20093","source":"Help Net Security","article_title":"Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)","article_url":"https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093/","published_at":"2026-04-03T12:59:22.000Z"},{"type":"cve","value":"CVE-2026-2699","source":"GBHackers","article_title":"New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover","article_url":"https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/","published_at":"2026-04-03T12:52:55.000Z"},{"type":"cve","value":"CVE-2026-2701","source":"GBHackers","article_title":"New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover","article_url":"https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/","published_at":"2026-04-03T12:52:55.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"GBHackers","article_title":"CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild","article_url":"https://gbhackers.com/cisa-includes-trueconf-security-flaw-in-kev-catalog/","published_at":"2026-04-03T10:49:09.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"GBHackers","article_title":"14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability","article_url":"https://gbhackers.com/14000-f5-big-ip-apm-instances-exposed-online/","published_at":"2026-04-03T10:40:25.000Z"},{"type":"cve","value":"CVE-2025-55182","source":"GBHackers","article_title":"Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts","article_url":"https://gbhackers.com/attackers-abuse-react2shell-flaw/","published_at":"2026-04-03T06:49:02.000Z"},{"type":"domain","value":"b2b-contenthub.com","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=300%2C168&quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=768%2C432&quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=1024%2C576&quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"domain","value":"mend.io","source":"Help Net Security","article_title":"New infosec products of the month: March 2026","article_url":"https://www.helpnetsecurity.com/2026/04/03/new-infosec-products-of-the-month-march-2026/","published_at":"2026-04-03T04:00:58.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9878,","source":"SANS ISC","article_title":"ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)","article_url":"https://isc.sans.edu/diary/rss/32862","published_at":"2026-04-03T02:00:02.000Z"}]}