<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='18. April 2026 16:30 pm' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/cisa-loses-nearly-all-top-officials-as-purge-continues/</loc>
		<lastmod>2025-05-27T16:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-authorities-charge-16-in-operation-to-disrupt-danabot-malware/</loc>
		<lastmod>2025-05-27T16:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitlab-vulnerability-highlights-the-double-edged-nature-of-ai-assistants-2/</loc>
		<lastmod>2025-05-27T16:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matlab-developer-bringing-systems-back-online-following-ransomware-attack/</loc>
		<lastmod>2025-05-27T16:07:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-fake-docusign-notifications-to-steal-corporate-data/</loc>
		<lastmod>2025-05-27T16:07:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-leveraged-in-msp-attack-using-rmm-tool/</loc>
		<lastmod>2025-05-27T16:14:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-laundry-bear-linked-to-2024-dutch-police-attack/</loc>
		<lastmod>2025-05-27T16:14:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unsophisticated-actors-poor-hygiene-prompt-ci-alert-for-oil-gas/</loc>
		<lastmod>2025-05-27T16:25:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-passwordscon-combating-phone-spoofing-with-stir-shaken/</loc>
		<lastmod>2025-05-27T17:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-engineering-certifications-rolling-out-soon/</loc>
		<lastmod>2025-05-27T17:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-an-ssl-stripping-attack-and-how-to-prevent-it/</loc>
		<lastmod>2025-05-27T17:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-ai-foundry-agent-service-launches-multi-agent-orchestration/</loc>
		<lastmod>2025-05-27T17:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-launches-thirteen-mcp-servers-to-enhance-ai-access/</loc>
		<lastmod>2025-05-27T17:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-says-it-blocked-2-billion-in-app-store-fraud-last-year/</loc>
		<lastmod>2025-05-27T17:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/via-snapchat-zum-finanzagenten-polizei-warnt-vor-betrugsmasche-mit-jugendlichen/</loc>
		<lastmod>2025-05-27T17:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-confirms-cyber-attack-customer-data-stolen/</loc>
		<lastmod>2025-05-27T17:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-apple-os-makeover-heres-what-to-expect-when/</loc>
		<lastmod>2025-05-27T17:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenleck-und-jetzt-so-erfahrst-du-ob-du-betroffen-bist/</loc>
		<lastmod>2025-05-27T17:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsa-and-bitcoin-at-big-risk-from-quantum-compute/</loc>
		<lastmod>2025-05-27T18:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sbom-management-and-generation-how-sonatype-leads-in-software-supply-chain-visibility/</loc>
		<lastmod>2025-05-27T18:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-stop-ai-from-scraping-your-website/</loc>
		<lastmod>2025-05-27T18:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-70000-impacted-by-ransomware-attack-on-sheboygan-wisconsin/</loc>
		<lastmod>2025-05-27T18:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-accuses-taiwan-linked-group-of-cyberattack-on-local-tech-company/</loc>
		<lastmod>2025-05-27T18:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-law-firms-hackers-are-calling-offices-in-stealth-phishing-scam/</loc>
		<lastmod>2025-05-27T18:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-silent-ransom-group-adopts-vishing-campaign-against-law-firms/</loc>
		<lastmod>2025-05-27T18:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-new-hacker-millionaire-class-was-built/</loc>
		<lastmod>2025-05-27T18:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/danabot-takedown-deals-blow-to-russian-cybercrime/</loc>
		<lastmod>2025-05-27T18:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-self-spreading-malware-infects-docker-containers-to-mine-dero-cryptocurrency/</loc>
		<lastmod>2025-05-27T18:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-drafting/</loc>
		<lastmod>2025-05-27T19:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-security-in-the-ai-era-balancing-speed-and-safety-under-new-eu-regulations/</loc>
		<lastmod>2025-05-27T19:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hospital-programmer-gets-14-years-for-leaking-soldier-data-to-ukraine/</loc>
		<lastmod>2025-05-27T19:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-customers-personal-information-at-risk-after-data-breach/</loc>
		<lastmod>2025-05-27T19:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-flow-addressing-the-national-security-vulnerabilities-in-the-us-water-supply/</loc>
		<lastmod>2025-05-27T19:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-russian-cyber-spy-crew-laundry-bear-joins-the-email-stealing-pack/</loc>
		<lastmod>2025-05-27T19:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nato-countries-targeted-by-new-russian-espionage-group/</loc>
		<lastmod>2025-05-27T19:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/naughty-ai-openai-o3-spotted-ignoring-shutdown-instructions/</loc>
		<lastmod>2025-05-27T19:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maturing-uk-fintechs-increase-tech-and-cyber-security-hiring/</loc>
		<lastmod>2025-05-27T19:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-makes-fresh-indictments-over-danabot-qakbot-malwares/</loc>
		<lastmod>2025-05-27T19:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armed-forces-charity-steps-in-to-address-cyber-mental-health-crisis/</loc>
		<lastmod>2025-05-27T19:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-biomedical-devices-in-the-large-healthcare-enterprise/</loc>
		<lastmod>2025-05-27T20:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-k-12-cybersecurity-hype-or-helpful/</loc>
		<lastmod>2025-05-27T20:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-pleads-guilty-to-robbinhood-ransomware-attacks-faces-30-years/</loc>
		<lastmod>2025-05-27T20:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mathworks-creator-of-matlab-confirms-ransomware-attack/</loc>
		<lastmod>2025-05-27T20:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eskimming-security-driving-bottom-line-results-through-fraud-reduction-and-revenue-maximization/</loc>
		<lastmod>2025-05-27T21:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-pleads-guilty-to-launching-baltimore-ransomware-attack-faces-30-years-behind-bars/</loc>
		<lastmod>2025-05-27T21:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-flags-fake-ai-video-generators-laced-with-malware/</loc>
		<lastmod>2025-05-27T21:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-russian-state-sponsored-apt-quickly-gains-global-reach-hitting-expansive-targets/</loc>
		<lastmod>2025-05-27T21:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rapidfort-carahsoft-partner-to-speed-up-fedramp-cmmc-compliance-for-public-sector/</loc>
		<lastmod>2025-05-27T21:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-it-starts-with-automation-how-workflow-builders-are-transforming-teams/</loc>
		<lastmod>2025-05-27T21:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-capsule-partnership-adds-to-msp-mssp-insurance-options/</loc>
		<lastmod>2025-05-27T21:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-moves-to-deepen-ai-stack-with-informatica-buy/</loc>
		<lastmod>2025-05-27T21:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/limerston-capital-acquires-cybercrowd-to-launch-uk-cybersecurity-services-platform/</loc>
		<lastmod>2025-05-27T21:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/limacharlie-adds-endpoint-protection-controls-to-streamline-microsoft-defender-management/</loc>
		<lastmod>2025-05-27T21:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proficio-and-cisco-join-forces-to-deliver-managed-xdr-for-roundclock-threat-detection/</loc>
		<lastmod>2025-05-27T21:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exabeam-vectra-ai-partner-to-tackle-cloud-threats/</loc>
		<lastmod>2025-05-27T21:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/goto-and-acronis-partner-to-deliver-integrated-data-protection-suite-for-msps/</loc>
		<lastmod>2025-05-27T21:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-threats-reshape-hybrid-cloud-security/</loc>
		<lastmod>2025-05-27T21:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-flag-cross-cloud-recon-tactic/</loc>
		<lastmod>2025-05-27T21:06:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revocation-of-sec-cyber-disclosure-rule-sought-by-banking-groups/</loc>
		<lastmod>2025-05-27T21:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bipartisan-bill-pushing-for-vulnerability-disclosure-rules-for-federal-contractors-revived/</loc>
		<lastmod>2025-05-27T21:07:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-user-data-hungry-ai-chatbots-identified/</loc>
		<lastmod>2025-05-27T21:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-280k-impacted-by-nova-scotia-power-ransomware-hack/</loc>
		<lastmod>2025-05-27T21:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safepay-ransomware-hits-over-235k-marlboro-chesterfield-pathology-patients/</loc>
		<lastmod>2025-05-27T21:07:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-att-breach-compromises-31m-records/</loc>
		<lastmod>2025-05-27T21:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-5-5k-edge-devices-breached-to-become-honeypots/</loc>
		<lastmod>2025-05-27T21:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defectdojo-unifies-soc-and-appsec-workflows-with-next-gen-pro-platform/</loc>
		<lastmod>2025-05-27T21:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/host-network-data-pilfered-by-dozens-of-nefarious-npm-packages/</loc>
		<lastmod>2025-05-27T21:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-web-browsers-subjected-to-katz-stealer-compromise/</loc>
		<lastmod>2025-05-27T21:08:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-and-citrix-parent-renew-bidding-war-for-informatica/</loc>
		<lastmod>2025-05-27T21:09:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bios-and-bootloaders-in-the-crosshairs-growing-firmware-threats/</loc>
		<lastmod>2025-05-27T21:09:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/about-40-of-apps-lack-identity-security-basics/</loc>
		<lastmod>2025-05-27T21:09:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-against-pre-os-environments-escalate-report-finds/</loc>
		<lastmod>2025-05-27T21:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winos-4-0-malware-deployed-via-phony-software-installers/</loc>
		<lastmod>2025-05-27T21:09:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-legitimate-tools-spoofed-to-spread-bumblebee-malware/</loc>
		<lastmod>2025-05-27T21:10:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spain-reportedly-behind-careto-hacking-operation/</loc>
		<lastmod>2025-05-27T21:10:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-looking-to-usurp-other-ransomware-gangs/</loc>
		<lastmod>2025-05-27T21:10:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-us-law-firms-facing-luna-moth-ransomware-threat/</loc>
		<lastmod>2025-05-27T21:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/study-one-in-three-cloud-assets-are-easily-exploitable/</loc>
		<lastmod>2025-05-27T21:10:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cloud-attack-targets-serverless-platforms/</loc>
		<lastmod>2025-05-27T21:11:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-breaks-the-traditional-security-stack-and-how-to-fix-it/</loc>
		<lastmod>2025-05-27T21:11:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cancer-center-pays-patients-11-5m-in-double-extortion-hack/</loc>
		<lastmod>2025-05-27T21:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ai-tools-lure-users-in-year-long-malware-campaign/</loc>
		<lastmod>2025-05-27T21:11:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-begins-ai-training-using-eu-personal-data/</loc>
		<lastmod>2025-05-27T21:11:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-clone-antivirus-site-to-spread-venom-rat-and-steal-crypto-wallets/</loc>
		<lastmod>2025-05-27T21:12:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-passwordscon-long-live-short-lived-credentials-auto-rotating-secrets-at-scale/</loc>
		<lastmod>2025-05-27T22:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/masimo-says-cyberattack-will-not-prevent-it-from-fulfilling-orders/</loc>
		<lastmod>2025-05-27T22:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-to-acquire-mdr-trailblazer-red-canary/</loc>
		<lastmod>2025-05-27T22:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-o3-resists-shutdown-despite-instructions-study-claims/</loc>
		<lastmod>2025-05-27T22:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robbinhood-ransomware-hacker-pleads-guilty-in-us-court/</loc>
		<lastmod>2025-05-27T22:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-falls-victim-to-third-party-data-breach/</loc>
		<lastmod>2025-05-27T22:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-attacks-targeting-commvault-saas-environment/</loc>
		<lastmod>2025-05-27T22:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-strikes-msp-in-supply-chain-attack/</loc>
		<lastmod>2025-05-27T22:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-the-cookie-bite-mfa-bypass-risk/</loc>
		<lastmod>2025-05-27T23:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seceon-wins-msp-platform-provider-vendor-of-the-year-at-technology-reseller-awards-2025/</loc>
		<lastmod>2025-05-27T23:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-man-pleads-guilty-in-robbinhood-ransomware-scheme/</loc>
		<lastmod>2025-05-27T23:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-acquires-red-canary-for-boost-in-ai-driven-security-operations/</loc>
		<lastmod>2025-05-27T23:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-retina-ladt-ein-online-veranstaltung-fur-sehbeeintrachtigte-menschen-am-25-juni-2025/</loc>
		<lastmod>2025-05-27T23:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beliebtes-streaming-mit-kehrseite-fast-40-000-gestohlene-netflix-zugange-in-deutschland/</loc>
		<lastmod>2025-05-27T23:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-scams-in-affiliate-marketing-to-know-in-2025/</loc>
		<lastmod>2025-05-27T23:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-operator-chained-simplehelp-flaws-to-target-an-msp-and-its-customers/</loc>
		<lastmod>2025-05-27T23:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-buys-startup-veriti-to-advance-threat-management/</loc>
		<lastmod>2025-05-27T23:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-typhoon-believed-to-be-behind-commvault-data-breach/</loc>
		<lastmod>2025-05-27T23:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-abuses-msps-simplehelp-rmm-to-encrypt-customers/</loc>
		<lastmod>2025-05-27T23:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patched-gitlab-duo-flaws-risked-code-leak-malicious-content/</loc>
		<lastmod>2025-05-27T23:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-russian-apt-group-void-blizzard-targets-nato-based-orgs-after-infiltrating-dutch-police/</loc>
		<lastmod>2025-05-28T00:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-future-proofs-new-ai-model-with-rigorous-safety-rules/</loc>
		<lastmod>2025-05-28T00:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/</loc>
		<lastmod>2025-05-28T00:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/void-blizzard-new-russian-cyberespionage-group-targets-nato-and-ukraine/</loc>
		<lastmod>2025-05-28T04:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/earth-lamia-china-linked-apt-targets-global-industries-with-custom-backdoors/</loc>
		<lastmod>2025-05-28T04:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-click-on-that-facebook-ad-for-a-textai-video-tool/</loc>
		<lastmod>2025-05-28T04:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-police-arrest-cybercrime-gang-copycats-of-myanmar-biz-model/</loc>
		<lastmod>2025-05-28T04:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-wertvollsten-security-zertifizierungen/</loc>
		<lastmod>2025-05-28T05:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-becomes-go-to-platform-for-malware-delivery-across-europe/</loc>
		<lastmod>2025-05-28T05:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hottest-cybersecurity-open-source-tools-of-the-month-may-2025/</loc>
		<lastmod>2025-05-28T05:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veranderte-angriffsmuster-mehr-malware-aber-weniger-ransomware-in-deutschland/</loc>
		<lastmod>2025-05-28T06:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemeinde-in-brasilien-mit-cyberangriff-um-umgerechnet-e-251-000-bestohlen/</loc>
		<lastmod>2025-05-28T06:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-ein-bergbauunternehmen-in-argentinien/</loc>
		<lastmod>2025-05-28T06:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-bei-einem-software-anbieter-aus-den-usa/</loc>
		<lastmod>2025-05-28T06:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-spawns-an-x86-supercomputing-monster-with-an-amd-connection/</loc>
		<lastmod>2025-05-28T06:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-we-solve-the-insane-deepfake-video-problem/</loc>
		<lastmod>2025-05-28T06:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-data-provenance-must-anchor-every-cisos-ai-governance-strategy/</loc>
		<lastmod>2025-05-28T06:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/woodpecker-open-source-red-teaming-for-ai-kubernetes-apis/</loc>
		<lastmod>2025-05-28T06:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ausnutzung-spekulativer-technologie-eth-forscher-entdecken-schwachstelle-in-allen-intel-prozessoren/</loc>
		<lastmod>2025-05-28T06:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finanzieller-schaden-durch-vatertagsgruse-vorsicht-vor-fake-whatsapp-und-fake-sms/</loc>
		<lastmod>2025-05-28T07:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/will-ai-agent-fueled-attacks-force-cisos-to-fast-track-passwordless-projects/</loc>
		<lastmod>2025-05-28T07:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-gelingt-schlag-gegen-cyberkriminalitat/</loc>
		<lastmod>2025-05-28T07:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-blocks-9-billion-in-fraud-over-5-years-amid-rising-app-store-threats/</loc>
		<lastmod>2025-05-28T07:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/praxisnahe-sicherheitsanalysen-was-wirklich-zahlt-jenseits-der-checklisten/</loc>
		<lastmod>2025-05-28T07:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-angst-vor-dem-schwachsten-glied-in-der-lieferkette-2/</loc>
		<lastmod>2025-05-28T07:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-double-whammy-first-hit-an-msp-then-use-rmm-software-to-push-ransomware/</loc>
		<lastmod>2025-05-28T08:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-ubernimmt-veriti-mehr-schutz-vor-cyberrisiken-in-zeiten-von-ki/</loc>
		<lastmod>2025-05-28T08:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdachtige-verhaftet-geldautomatensprenger-haben-12-millionen-euro-erbeutet/</loc>
		<lastmod>2025-05-28T08:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-interaction-libvpx-flaw-in-firefox-allows-attackers-to-run-arbitrary-code/</loc>
		<lastmod>2025-05-28T08:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-directory-anbindung-fur-grc-plattformen-hiscout-integriert-ad-synchronisation-in-grc-suite/</loc>
		<lastmod>2025-05-28T08:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-security-and-redteam-hacker-academy-announce-partnership-to-advance-cybersecurity-skills-in-the-middle-east/</loc>
		<lastmod>2025-05-28T09:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-mehr-malware-aber-weniger-ransomware/</loc>
		<lastmod>2025-05-28T09:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agenten-ki-die-stille-revolution-der-cyber-sicherheit/</loc>
		<lastmod>2025-05-28T09:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-email-a-losing-battle-cisos-must-give-up/</loc>
		<lastmod>2025-05-28T09:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-stops-1-9m-risky-apps-terminates-146k-fraud-accounts-in-2024/</loc>
		<lastmod>2025-05-28T09:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-warns-giant-e-tailer-to-stop-cheating-consumers-or-face-its-wrath/</loc>
		<lastmod>2025-05-28T09:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-publishes-ics-advisories-highlighting-new-vulnerabilities-and-exploits/</loc>
		<lastmod>2025-05-28T09:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-security-patch-addresses-high-severity-vulnerabilities-enabling-code-execution/</loc>
		<lastmod>2025-05-28T09:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-russian-state-hacking-group-hits-europe-and-north-america/</loc>
		<lastmod>2025-05-28T09:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdachtige-verhaftet-geldautomatensprenger-erbeuten-12-millionen-euro/</loc>
		<lastmod>2025-05-28T09:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-campaign-uses-dbatloader-to-drop-remcos-rat-what-analysts-need-to-know/</loc>
		<lastmod>2025-05-28T10:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-man-pleaded-guilty-to-role-in-robbinhood-ransomware-attacks/</loc>
		<lastmod>2025-05-28T10:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matlab-serving-over-5-million-users-hit-by-ransomware-attack/</loc>
		<lastmod>2025-05-28T10:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-security-and-redteam-hacker-academy-announce-partnership-to-advance-cybersecurity-skills-in-the-middle-east-2/</loc>
		<lastmod>2025-05-28T10:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vietnam-nexus-hackers-distribute-malware-via-fake-ai-video-generator-websites/</loc>
		<lastmod>2025-05-28T10:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-dr-jurgen-durrwang-head-of-pentesting-bei-itk-engineering-pentesting-ist-geduldiges-handwerk-und-ein-bisschen-kunst/</loc>
		<lastmod>2025-05-28T10:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-server-github-tool-ermoglicht-datenklau-aus-privaten-code-repos/</loc>
		<lastmod>2025-05-28T10:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-spies-blamed-for-attempted-hack-on-czech-government-network/</loc>
		<lastmod>2025-05-28T11:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crooks-use-a-fake-antivirus-site-to-spread-venom-rat-and-a-mix-of-malware/</loc>
		<lastmod>2025-05-28T11:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-executive-guide-on-siem-and-soar-platforms-for-rapid-threat-detection/</loc>
		<lastmod>2025-05-28T11:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-browserthe-middle-attacks-steal-sessions-in-seconds/</loc>
		<lastmod>2025-05-28T11:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-customer-data-stolen-in-third-party-attack/</loc>
		<lastmod>2025-05-28T11:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plattner-fordert-schutz-der-energieversorgung-versteckte-kommunikationsmodule-in-solarwechselrichtern-aus-china/</loc>
		<lastmod>2025-05-28T11:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datensouveranitat-ist-alternativlos-warum-kollaborations-software-made-in-germany-sein-sollte/</loc>
		<lastmod>2025-05-28T11:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberwarfare-im-visier-warum-proaktive-sicherheit-jetzt-zahlt/</loc>
		<lastmod>2025-05-28T11:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-blocked-over-9-billion-in-app-store-fraud-in-five-years/</loc>
		<lastmod>2025-05-28T11:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/251-amazon-hosted-ips-used-in-exploit-scan-targeting-coldfusion-struts-and-elasticsearch/</loc>
		<lastmod>2025-05-28T11:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robinhood-ransomware-operator-arrested-for-attacks-on-government-and-private-networks/</loc>
		<lastmod>2025-05-28T12:07:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managed-detection-response-wo-setzen-unternehmen-auf-professionelle-cybersecurity-hilfe/</loc>
		<lastmod>2025-05-28T12:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-circulate-over-93-billion-stolen-user-cookies-on-the-dark-web/</loc>
		<lastmod>2025-05-28T12:26:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mental-denial-of-service-narrative-malware-and-the-future-of-resilience/</loc>
		<lastmod>2025-05-28T12:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-unterstutzt-internationale-operation-gegen-lumma-stealer/</loc>
		<lastmod>2025-05-28T12:42:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-hit-msp-use-its-rmm-software-to-deliver-ransomware-to-clients/</loc>
		<lastmod>2025-05-28T13:08:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mimo-hackers-exploit-cve-2025-32432-in-craft-cms-to-deploy-cryptominer-and-proxyware/</loc>
		<lastmod>2025-05-28T13:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-oauth-grant-types/</loc>
		<lastmod>2025-05-28T13:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-recognized-by-forrester-in-the-network-analysis-and-visibility-nav-solution-landscape/</loc>
		<lastmod>2025-05-28T13:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-fireside-chat-purple-teams-dismantle-the-reactive-trap-and-can-help-restore-cyber-readiness/</loc>
		<lastmod>2025-05-28T13:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/choosing-a-secrets-manager-for-multi-cloud-doppler-vs-cloud-native-tools/</loc>
		<lastmod>2025-05-28T13:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-tallies-up-russian-cyberattacks-on-local-media-since-start-of-war/</loc>
		<lastmod>2025-05-28T13:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysob-veranstaltet-branchen-highlight-des-jahres-mit-mehr-als-100-teilnehmern/</loc>
		<lastmod>2025-05-28T13:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dreiteilige-malware-sorgt-fur-verbreitung-der-morpheus-ransomware/</loc>
		<lastmod>2025-05-28T13:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-cybersicherheitstipps-fur-reisende/</loc>
		<lastmod>2025-05-28T13:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-it-pro-sentenced-to-14-years-forced-labor-for-sharing-medical-data-with-ukraine/</loc>
		<lastmod>2025-05-28T13:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empire-of-office-workers-strikes-back-against-rto-mandates/</loc>
		<lastmod>2025-05-28T13:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-purchase-fraud-surges-14-says-banking-industry/</loc>
		<lastmod>2025-05-28T13:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-wants-windows-to-update-all-software-on-your-pc/</loc>
		<lastmod>2025-05-28T13:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silentwerewolf-attack-combines-legitimate-tools-with-code-obfuscation-for-stealthy-infiltration/</loc>
		<lastmod>2025-05-28T13:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/panel-talk-im-candy-cyber-club-security-als-teamsport-keiner-verfugt-uber-superkrafte/</loc>
		<lastmod>2025-05-28T13:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-formbook-malware-threatens-windows-users-with-complete-system-takeover/</loc>
		<lastmod>2025-05-28T13:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/getrankekonzern-unter-druck-hacker-erpressen-coca-cola-und-leaken-interne-daten/</loc>
		<lastmod>2025-05-28T13:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-crypto-is-changing-the-game-for-financial-scammers/</loc>
		<lastmod>2025-05-28T14:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-latest-in-phishing-scams-stealing-your-information-through-fake-online-forms/</loc>
		<lastmod>2025-05-28T14:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-risk-lurking-in-your-infrastructure-mismanaged-certificates/</loc>
		<lastmod>2025-05-28T14:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-unternehmen-in-deutschland-durch-die-ds-gvo-scheitern/</loc>
		<lastmod>2025-05-28T14:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-you-use-onedrive-to-upload-files-to-chatgpt-or-zoom-dont/</loc>
		<lastmod>2025-05-28T14:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-stehlen-coca-cola-daten/</loc>
		<lastmod>2025-05-28T14:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/optiv-ceo-on-new-intelligence-system-theres-nothing-on-the-planet-like-this/</loc>
		<lastmod>2025-05-28T14:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-detains-alleged-russian-spies-who-used-dash-cams-to-guide-missile-strikes/</loc>
		<lastmod>2025-05-28T14:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-vietnam-based-hackers-using-bogus-ai-video-generators-to-spread-malware/</loc>
		<lastmod>2025-05-28T14:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-ubernimmt-veriti-um-das-management-von-risiken-durch-cyberbedrohungen-zu-verbessern/</loc>
		<lastmod>2025-05-28T14:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-vs-mcafee-which-antivirus-is-right-for-you/</loc>
		<lastmod>2025-05-28T14:05:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-introduces-new-windows-backup-tool-for-businesses/</loc>
		<lastmod>2025-05-28T14:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-weaponizing-dcom-to-harvest-credentials-on-windows-systems/</loc>
		<lastmod>2025-05-28T14:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/venomrat-malware-introduces-new-tools-for-password-theft-and-stealthy-access/</loc>
		<lastmod>2025-05-28T14:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/have-your-say-dark-reading-seeks-your-input/</loc>
		<lastmod>2025-05-28T14:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-announces-deal-to-acquire-red-canary/</loc>
		<lastmod>2025-05-28T14:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pumabot-botnet-targets-linux-iot-devices-to-steal-ssh-credentials-and-mine-crypto/</loc>
		<lastmod>2025-05-28T14:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-infection-to-access-a-24-hour-timeline-of-a-modern-stealer-campaign/</loc>
		<lastmod>2025-05-28T14:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-onedrive-flaw-exposes-users-to-data-overreach-risks/</loc>
		<lastmod>2025-05-28T14:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-faces-one-of-the-largest-alleged-data-breaches-1-2-billion-accounts-at-risk/</loc>
		<lastmod>2025-05-28T15:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-data-breach-highlights-third-party-risks-why-ai-based-cybersecurity-solutions-are-essential/</loc>
		<lastmod>2025-05-28T15:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/estonia-issues-arrest-warrant-for-moroccan-wanted-for-major-pharmacy-data-breach/</loc>
		<lastmod>2025-05-28T15:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-broker-giant-lexisnexis-says-breach-exposed-personal-information-of-over-364000-people/</loc>
		<lastmod>2025-05-28T15:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dior-cyber-attack-exposes-retail-vulnerabilities-why-threat-detection-and-response-must-be-a-priority/</loc>
		<lastmod>2025-05-28T15:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/app-store-security-apple-stops-2b-in-fraud-in-2024-alone-9b-over-5-years/</loc>
		<lastmod>2025-05-28T15:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/czechia-blames-china-for-ministry-of-foreign-affairs-cyberattack/</loc>
		<lastmod>2025-05-28T15:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-weaponize-fake-ai-themed-websites-to-deliver-python-based-infostealers/</loc>
		<lastmod>2025-05-28T15:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-to-acquire-red-canary-enhancing-ai-powered-security-operations/</loc>
		<lastmod>2025-05-28T15:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/251-malicious-ips-target-cloud-based-device-exploiting-75-exposure-points/</loc>
		<lastmod>2025-05-28T15:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-take9-wont-improve-cybersecurity/</loc>
		<lastmod>2025-05-28T15:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/czech-republic-accuses-china-of-government-hack/</loc>
		<lastmod>2025-05-28T15:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-300-domains-beschlagnahmt-microsoft-zerschlagt-lumma-stealer/</loc>
		<lastmod>2025-05-28T15:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-passwordscon-zero-downtime-credential-rotation/</loc>
		<lastmod>2025-05-28T16:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-enters-agreement-to-buy-red-canary/</loc>
		<lastmod>2025-05-28T16:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pumabot-targets-linux-iot-surveillance-devices/</loc>
		<lastmod>2025-05-28T16:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-bringt-cybersicherheitspakt-2030-in-die-diskussion/</loc>
		<lastmod>2025-05-28T16:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evertz-sdn-vulnerabilities-enable-unauthenticated-arbitrary-command-execution/</loc>
		<lastmod>2025-05-28T16:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-apt28-hackers-attacking-nato-aligned-organizations-to-steal-sensitive-data/</loc>
		<lastmod>2025-05-28T16:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/earth-lamia-hackers-exploits-vulnerabilities-in-web-applications-to-attack-multiple-industries/</loc>
		<lastmod>2025-05-28T16:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xenserver-windows-vm-tools-flaw-enables-attackers-to-run-arbitrary-code/</loc>
		<lastmod>2025-05-28T16:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-dutch-government-spot-new-russian-hacking-group-targeting-critical-infrastructure/</loc>
		<lastmod>2025-05-28T16:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-unterschatzen-risiken-von-datenverlust-bei-saas-anwendungen/</loc>
		<lastmod>2025-05-28T16:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-onedrive-file-picker-flaw-grants-apps-full-cloud-access-even-when-uploading-just-one-file/</loc>
		<lastmod>2025-05-28T16:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-vulnerability-exploit-could-expose-uk-nhs-data/</loc>
		<lastmod>2025-05-28T16:07:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-bitdefender-site-spreads-trio-of-malware-tools/</loc>
		<lastmod>2025-05-28T16:07:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-segment-ssh-and-rdp-for-zero-trust-success/</loc>
		<lastmod>2025-05-28T17:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-dutch-government-discover-new-russian-hacking-group/</loc>
		<lastmod>2025-05-28T17:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-healthtech-startups-can-build-scalable-data-governance-frameworks-from-day-one/</loc>
		<lastmod>2025-05-28T17:08:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apollo-mcp-server-bridging-ai-agents-and-graphql-apis/</loc>
		<lastmod>2025-05-28T17:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-enhances-exposure-management-with-veriti-acquisition/</loc>
		<lastmod>2025-05-28T17:08:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mistral-launches-devstral-open-source-llm-for-coding-agents/</loc>
		<lastmod>2025-05-28T17:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-risk-solutions-says-364000-impacted-by-breach-involving-github-data/</loc>
		<lastmod>2025-05-28T17:08:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-hidden-in-ai-models-on-pypi-targets-alibaba-ai-labs-users/</loc>
		<lastmod>2025-05-28T17:09:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-buys-red-canary-to-elevate-ai-driven-threat-response/</loc>
		<lastmod>2025-05-28T17:09:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-partners-cybercrime-gang-fuels-large-scale-crypto-heists/</loc>
		<lastmod>2025-05-28T17:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-mobile-apps-may-not-be-as-secure-as-you-think%c2%a6-firetail-blog/</loc>
		<lastmod>2025-05-28T17:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-orders-godaddy-to-bolster-its-security-after-years-of-attacks/</loc>
		<lastmod>2025-05-28T17:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worldwide-operation-shuts-down-hundreds-of-ransomware-servers-and-domains-ending-key-attack-infrastructure/</loc>
		<lastmod>2025-05-28T17:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-blocked-2-million-malicious-app-9-billion-in-fraudulent-transactions/</loc>
		<lastmod>2025-05-28T17:10:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-actors-exploits-rmm-tools-to-gain-access-to-organizations/</loc>
		<lastmod>2025-05-28T17:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cellcom-restores-regional-mobile-services-after-cyberattack/</loc>
		<lastmod>2025-05-28T17:10:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-verzeichnisdienst-was-ist-active-directory-ad/</loc>
		<lastmod>2025-05-28T17:10:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/militarfunk-motorola-kauft-silvus-fur-44-milliarden-us-dollar/</loc>
		<lastmod>2025-05-28T17:44:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnet-hacks-9000-asus-routers-to-add-persistent-ssh-backdoor/</loc>
		<lastmod>2025-05-28T18:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zanubis-android-malware-harvests-banking-credentials-and-executes-remote-commands/</loc>
		<lastmod>2025-05-28T18:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-are-turning-ordinary-citizens-into-money-mules-in-a-new-rentbank-account-scam/</loc>
		<lastmod>2025-05-28T18:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oregon-becomes-second-state-to-ban-sale-of-precise-geolocation-data/</loc>
		<lastmod>2025-05-28T18:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infinigate-and-softcat-provide-investor-cheer/</loc>
		<lastmod>2025-05-28T18:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ai-video-tool-ads-on-facebook-linkedin-spread-infostealers/</loc>
		<lastmod>2025-05-28T18:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-to-acquire-veriti-to-transform-threat-exposure-management/</loc>
		<lastmod>2025-05-28T18:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-evolution-of-software-development-from-machine-code-to-ai-orchestration/</loc>
		<lastmod>2025-05-28T19:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-12-million-stolen-from-crypto-platform-cork-protocol/</loc>
		<lastmod>2025-05-28T19:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attack-on-lexisnexis-risk-solutions-exposes-data-on-300k/</loc>
		<lastmod>2025-05-28T19:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/czech-republic-accuses-chinas-apt31-of-a-cyberattack-on-its-foreign-ministry/</loc>
		<lastmod>2025-05-28T19:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/95-of-organizations-lack-a-quantum-computing-strategy/</loc>
		<lastmod>2025-05-28T19:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/</loc>
		<lastmod>2025-05-28T19:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/implementing-secure-by-design-principles-for-ai/</loc>
		<lastmod>2025-05-28T19:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hacker-pleads-guilty-in-19-million-robbinhood-ransomware-attack-on-baltimore/</loc>
		<lastmod>2025-05-28T19:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/czech-republic-blames-china-linked-apt31-hackers-for-2022-cyberattack/</loc>
		<lastmod>2025-05-28T19:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-passwordscon-cve-hunting-wi-fi-routers-osint-the-tyranny-of-the-default/</loc>
		<lastmod>2025-05-28T20:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-mass-spec/</loc>
		<lastmod>2025-05-28T20:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-market-guide-for-supply-chain-security-why-you-need-a-comprehensive-solution/</loc>
		<lastmod>2025-05-28T20:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-used-google-calendar-to-aid-attacks-on-government-entities/</loc>
		<lastmod>2025-05-28T20:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/czech-government-attributes-foreign-ministry-hack-to-china/</loc>
		<lastmod>2025-05-28T20:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-industrial-power-monitors-had-remote-hacking-flaws/</loc>
		<lastmod>2025-05-28T20:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-attackers-deploy-ai-generated-videos-on-tiktok/</loc>
		<lastmod>2025-05-28T20:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-boss-warns-of-sophisticated-google-phishing-scam/</loc>
		<lastmod>2025-05-28T20:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-warns-msps-over-dragonforce-threat/</loc>
		<lastmod>2025-05-28T20:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-your-traffic-logs-arent-telling-you-about-cloud-security/</loc>
		<lastmod>2025-05-28T21:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cfos-financial-execs-in-crosshairs-of-highly-targeted-spearphishing-campaign/</loc>
		<lastmod>2025-05-28T21:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/separating-hype-from-reality-how-cybercriminals-are-actually-using-ai/</loc>
		<lastmod>2025-05-28T21:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-hit-by-outages-as-it-battles-security-incident/</loc>
		<lastmod>2025-05-28T21:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-launches-new-identity-access-management-products-services/</loc>
		<lastmod>2025-05-28T21:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-ibm-agent-connect-a-new-marketplace-for-enterprise-ai-agents/</loc>
		<lastmod>2025-05-28T21:06:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-expands-channel-program-with-new-tiering-nfr-access-and-deal-registration-enhancements-for-msps-and-resellers/</loc>
		<lastmod>2025-05-28T21:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boomi-world-2025-reflections-analysts-on-boomi-msps-and-agentic-ai/</loc>
		<lastmod>2025-05-28T21:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netwrix-1secure-dspm-now-available-to-msps-via-pax8-marketplace/</loc>
		<lastmod>2025-05-28T21:06:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/file-picker-grants-access-to-a-users-entire-microsoft-onedrive/</loc>
		<lastmod>2025-05-28T21:07:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-to-acquire-veriti-deepen-wiz-integration/</loc>
		<lastmod>2025-05-28T21:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-fintech-cyber-gaps-in-saudi-arabia/</loc>
		<lastmod>2025-05-28T21:07:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-silent-push-chrome-tool-delivers-real-time-cyber-intel/</loc>
		<lastmod>2025-05-28T21:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marlink-flags-surge-in-ai-powered-cyberattacks/</loc>
		<lastmod>2025-05-28T21:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-white-house-adviser-warns-on-cybercrime-surge/</loc>
		<lastmod>2025-05-28T21:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governments-call-for-smarter-siem-and-soar-adoption/</loc>
		<lastmod>2025-05-28T21:08:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cyber-veteran-urges-stronger-korea-response/</loc>
		<lastmod>2025-05-28T21:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-hit-by-russian-linked-hackers/</loc>
		<lastmod>2025-05-28T21:08:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-to-shed-most-of-its-leaders-by-month-end/</loc>
		<lastmod>2025-05-28T21:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-allies-push-for-immediate-siem-soar-implementation/</loc>
		<lastmod>2025-05-28T21:09:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/balkanid-launches-self-service-iga-lite-with-transparent-pricing-for-identity-governance/</loc>
		<lastmod>2025-05-28T21:09:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guilt-admitted-by-robbinhood-ransomware-attacker/</loc>
		<lastmod>2025-05-28T21:09:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widespread-website-compromise-likely-with-ti-woocommerce-wishlist-plugin-bug/</loc>
		<lastmod>2025-05-28T21:09:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-stolen-browser-cookie-economy-uncovered/</loc>
		<lastmod>2025-05-28T21:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attack-against-wisconsin-city-hits-almost-67k/</loc>
		<lastmod>2025-05-28T21:10:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-party-breach-disclosed-by-adidas/</loc>
		<lastmod>2025-05-28T21:10:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coca-cola-employee-details-spilled-by-everest-ransomware-gang/</loc>
		<lastmod>2025-05-28T21:10:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mathworks-confirms-ransomware-attack-amid-ongoing-outages/</loc>
		<lastmod>2025-05-28T21:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novel-ghostspy-android-malware-examined/</loc>
		<lastmod>2025-05-28T21:10:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/venomrat-spread-via-fake-bitdefender-site/</loc>
		<lastmod>2025-05-28T21:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-packages-exploit-ml-models-to-deploy-infostealer/</loc>
		<lastmod>2025-05-28T21:11:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-points-steps-deeper-into-exposure-management-with-veriti/</loc>
		<lastmod>2025-05-28T21:11:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojanized-word-files-harnessed-in-new-russian-cyberespionage-campaign/</loc>
		<lastmod>2025-05-28T21:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-blamed-for-cyberattacks-against-china/</loc>
		<lastmod>2025-05-28T21:11:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-duo-expands-beyond-mfa-launches-security-first-identity-and-access-management-platform/</loc>
		<lastmod>2025-05-28T21:12:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-points-missing-from-agentic-ai-conversations-at-rsac/</loc>
		<lastmod>2025-05-28T21:12:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-void-blizzard-step-up-espionage-campaign/</loc>
		<lastmod>2025-05-28T21:12:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-finds-more-than-30-fake-ai-websites-spreading-malware/</loc>
		<lastmod>2025-05-28T21:12:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nine-steps-to-achieving-ai-governance/</loc>
		<lastmod>2025-05-28T21:12:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-rumors-of-siems-demise-are-greatly-exaggerated/</loc>
		<lastmod>2025-05-28T21:13:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-entra-design-lets-guest-users-gain-azure-control-researchers-say/</loc>
		<lastmod>2025-05-28T21:13:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revenue-cycle-management-firms-data-breach-total-soars/</loc>
		<lastmod>2025-05-28T21:13:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-healthcare-cybersecurity-progress-and-pitfalls/</loc>
		<lastmod>2025-05-28T21:13:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pumabot-botnet-brute-forces-ssh-credentials-to-breach-devices/</loc>
		<lastmod>2025-05-28T21:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/were-switching-to-calendar-versioning-heres-why/</loc>
		<lastmod>2025-05-28T22:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/questions-mount-as-ivanti-tackles-another-round-of-zero-days/</loc>
		<lastmod>2025-05-28T22:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-startup-horizon3-ai-is-raising-100m-in-new-round/</loc>
		<lastmod>2025-05-28T22:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pumabot-malware-targets-linux-iot-devices/</loc>
		<lastmod>2025-05-28T22:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-web-apps-have-full-access-to-onedrive-files/</loc>
		<lastmod>2025-05-28T22:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-the-news-locking-up-phones-logging-into-ai-classrooms-navigate-new-tech-amid-public-debate/</loc>
		<lastmod>2025-05-28T23:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-asus-routers-are-being-hit-with-stealthy-persistent-backdoors/</loc>
		<lastmod>2025-05-28T23:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sammelklagen-gegen-big-tech-nehmen-zu/</loc>
		<lastmod>2025-05-28T23:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paur-schreiben-der-vorwurf-der-schwarznutzung-und-der-datenschutz/</loc>
		<lastmod>2025-05-28T23:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-phishing-mit-ms-365-tenants/</loc>
		<lastmod>2025-05-28T23:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onedrive-file-picker-flaw-gives-apps-full-access-to-user-drives/</loc>
		<lastmod>2025-05-28T23:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-peek-behind-the-claude-curtain/</loc>
		<lastmod>2025-05-28T23:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-leadership-exodus-continues-shaking-local-offices/</loc>
		<lastmod>2025-05-28T23:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-security-portfolio-even-when-youre-a-blue-teamer/</loc>
		<lastmod>2025-05-28T23:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-confirms-customer-data-was-accessed-during-cyber-attack/</loc>
		<lastmod>2025-05-28T23:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5058499-update-rolls-out-new-share-and-click-to-do-features/</loc>
		<lastmod>2025-05-28T23:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt41-malware-abuses-google-calendar-for-stealthy-c2-communication/</loc>
		<lastmod>2025-05-28T23:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-web-apps-have-full-access-to-microsoft-onedrive-files/</loc>
		<lastmod>2025-05-28T23:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuroprivacy-im-fokus-mentale-privatsphare-bedroht/</loc>
		<lastmod>2025-05-29T00:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/damit-flughafen-online-bleiben-sita-bietet-neuen-satelliten-konnektivitatsdienst/</loc>
		<lastmod>2025-05-29T00:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-419-star-wars-the-cia-and-a-whatsapp-malware-mirage/</loc>
		<lastmod>2025-05-29T00:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-10-kb5058481-update-brings-seconds-back-to-calendar-flyout/</loc>
		<lastmod>2025-05-29T00:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/realitat-cyberwarfare-warum-pravention-entscheidend-ist/</loc>
		<lastmod>2025-05-29T04:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risk-assessment-vital-when-choosing-an-ai-model-say-experts/</loc>
		<lastmod>2025-05-29T04:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cyber-threat-utg015-exploits-0-days-for-espionage-in-asia/</loc>
		<lastmod>2025-05-29T04:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealthy-attacks-silent-werewolf-deploys-custom-loaders-in-espionage-operations/</loc>
		<lastmod>2025-05-29T04:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-website-laid-bare-for-three-days-after-security-incident/</loc>
		<lastmod>2025-05-29T04:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cost-of-compromise-why-password-attacks-are-still-winning-in-2025/</loc>
		<lastmod>2025-05-29T04:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/find-the-best-ciam-solution-for-your-business-a-comprehensive-guide-to-modern-customer-identity-management/</loc>
		<lastmod>2025-05-29T05:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-threat-hunt-living-off-the-land-binaries/</loc>
		<lastmod>2025-05-29T05:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/review-cybersecurity-for-dummies-3rd-edition/</loc>
		<lastmod>2025-05-29T05:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-q1-2025-neue-angriffsmuster-und-technische-schwachstellen/</loc>
		<lastmod>2025-05-29T06:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manage-it-techtalk-mit-diesen-cybergefahren-sieht-sich-die-industrie-konfrontiert/</loc>
		<lastmod>2025-05-29T06:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-im-gesundheitswesen-zwischen-regulatorischem-aufbruch-und-technischer-stagnation/</loc>
		<lastmod>2025-05-29T06:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kryptoplattform-gehackt-12-millionen-gestohlen/</loc>
		<lastmod>2025-05-29T06:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-die-webseite-eines-modeunternehmens-aus-den-usa/</loc>
		<lastmod>2025-05-29T06:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-hotelgruppe-in-deutschland/</loc>
		<lastmod>2025-05-29T06:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krypto-borse-gehackt-mehr-als-200-millionen-gestohlen/</loc>
		<lastmod>2025-05-29T06:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisos-can-regain-ground-in-the-ai-fraud-war/</loc>
		<lastmod>2025-05-29T06:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teil-einer-russischen-angriffskampagne-day-schwachstelle-in-commvaults-azure-app-wird-aktiv-ausgenutzt/</loc>
		<lastmod>2025-05-29T06:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-prioritize-ai-driven-automation-to-optimize-cybersecurity-spending/</loc>
		<lastmod>2025-05-29T06:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-zielen-auf-daten-egal-woher/</loc>
		<lastmod>2025-05-29T07:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-rising-malware-trends-every-security-pro-should-know/</loc>
		<lastmod>2025-05-29T07:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-ceo-huang-warns-export-bans-empower-chinese-ai-firms/</loc>
		<lastmod>2025-05-29T07:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-100000-wordpress-sites-at-risk-from-critical-cvss-10-0-vulnerability-in-wishlist-plugin/</loc>
		<lastmod>2025-05-29T07:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staatlich-unterstutzte-hackergruppe-ta406-nordkoreanische-cyberspionage-in-der-ukraine/</loc>
		<lastmod>2025-05-29T07:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cisos-can-learn-from-the-frontlines-of-fintech-cybersecurity/</loc>
		<lastmod>2025-05-29T07:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-meta-exec-copyright-consent-obligation-end-of-ai-biz/</loc>
		<lastmod>2025-05-29T08:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ayysshush-botnet-compromised-over-9000-asus-routers-adding-a-persistent-ssh-backdoor/</loc>
		<lastmod>2025-05-29T08:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt41-exploits-google-calendar-for-malware-commandcontrol-operations/</loc>
		<lastmod>2025-05-29T08:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-onedrive-flaw-lets-malicious-websites-access-all-your-files/</loc>
		<lastmod>2025-05-29T08:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-hackers-turn-google-calendar-into-command-hub-using-toughprogress-malware-google-alerts/</loc>
		<lastmod>2025-05-29T08:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuerungen-in-der-cloud-sicherheitsplattform-crowdstrike-will-cloud-risiken-jeglicher-art-absichern/</loc>
		<lastmod>2025-05-29T08:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-a-ticking-time-bomb-for-your-data-reveals-new-report-from-varonis/</loc>
		<lastmod>2025-05-29T09:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorsicht-zum-vatertag-wenn-betruger-auf-gefuhle-setzen/</loc>
		<lastmod>2025-05-29T09:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-broker-lexisnexis-discloses-data-breach-affecting-364000-people/</loc>
		<lastmod>2025-05-29T09:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/woodpecker-red-teaming-tool-targets-ai-kubernetes-and-api-vulnerabilities/</loc>
		<lastmod>2025-05-29T09:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-botnet-targets-asus-routers-by-injecting-malicious-ssh-keys/</loc>
		<lastmod>2025-05-29T09:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-wordpress-plugin-disguised-as-java-update-infects-site-visitors/</loc>
		<lastmod>2025-05-29T09:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-and-apis-understand-complexities-today-to-authenticate-tomorrow/</loc>
		<lastmod>2025-05-29T10:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-risk-management-the-next-security-challenge/</loc>
		<lastmod>2025-05-29T10:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-make-europe-great-again-for-startups/</loc>
		<lastmod>2025-05-29T10:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-spear-phishing-campaign-targets-financial-executives-with-netbird-malware/</loc>
		<lastmod>2025-05-29T10:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-choicejacking-exploit-targets-android-and-ios-via-infected-charging-ports/</loc>
		<lastmod>2025-05-29T10:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-over-90-of-top-email-domains-vulnerable-to-spoofing-attacks/</loc>
		<lastmod>2025-05-29T10:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantencomputer-und-verschlusselung-warum-quantenresistenz-jetzt-auch-juristisch-pflicht-wird/</loc>
		<lastmod>2025-05-29T10:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-camouflaging-threats-as-ai-tool-installers/</loc>
		<lastmod>2025-05-29T11:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-might-fail-to-start-after-installing-kb5058405/</loc>
		<lastmod>2025-05-29T11:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-dell-powerstore-t-vulnerability-allows-full-system-compromise/</loc>
		<lastmod>2025-05-29T11:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-reveals-key-tcp-syn-patterns-for-detecting-malicious-activity/</loc>
		<lastmod>2025-05-29T11:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-website-taken-offline-after-cybersecurity-breach/</loc>
		<lastmod>2025-05-29T11:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/haozi-gang-sells-turnkey-phishing-tools-to-amateurs/</loc>
		<lastmod>2025-05-29T11:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentar-von-dr-robin-basu-dwinity-anonymisierte-dezentrale-daten-fur-bessere-produkte/</loc>
		<lastmod>2025-05-29T11:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-is-storing-migrant-childrens-dna-in-a-criminal-database/</loc>
		<lastmod>2025-05-29T11:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-it-infrastructure-is-hybrid-so-why-not-your-security-model/</loc>
		<lastmod>2025-05-29T12:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-enterprise-playbook-to-defending-against-volt-typhoon/</loc>
		<lastmod>2025-05-29T12:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-fireside-chat-cyber-risk-mitigation-turns-personaldefending-the-ceo-as-an-attack-vector/</loc>
		<lastmod>2025-05-29T12:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-centralized/</loc>
		<lastmod>2025-05-29T12:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-takes-down-website-after-security-incident/</loc>
		<lastmod>2025-05-29T12:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/utg015-hackers-launch-massive-brute-force-attacks-on-government-web-servers/</loc>
		<lastmod>2025-05-29T12:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-dedicated-siem-soar-guide-for-cybersecurity-professionals/</loc>
		<lastmod>2025-05-29T12:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-exploits-simplehelp-flaws-to-deploy-ransomware-across-customer-endpoints/</loc>
		<lastmod>2025-05-29T12:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-teams-generate-average-of-36m-in-business-growth/</loc>
		<lastmod>2025-05-29T12:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isx-it-security-conference-2025-lektionen-aus-dem-cyberangriff-auf-sudwestfalen-it/</loc>
		<lastmod>2025-05-29T12:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/model-context-protocol-mcp-vs-agentagent-a2a/</loc>
		<lastmod>2025-05-29T13:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-entras-billing-roles-pose-privilege-escalation-risks-in-azure/</loc>
		<lastmod>2025-05-29T13:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-bitdefender-website-used-to-spread-infostealer-malware/</loc>
		<lastmod>2025-05-29T13:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-military-to-establish-new-cyber-and-electromagnetic-command/</loc>
		<lastmod>2025-05-29T13:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-for-high-velocity-engineering/</loc>
		<lastmod>2025-05-29T13:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/billions-of-cookies-up-for-grabs-as-experts-warn-over-session-security/</loc>
		<lastmod>2025-05-29T13:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-apt41-used-google-calendar-as-c2-to-control-its-toughprogress-malware/</loc>
		<lastmod>2025-05-29T13:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-red-canary-acquisition-will-fortify-zscalers-mdr-muscle/</loc>
		<lastmod>2025-05-29T13:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-argo-cd-flaw-exposes-kubernetes-clusters-to-full-resource-manipulation/</loc>
		<lastmod>2025-05-29T13:04:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cloudflare-tunnels-to-launch-stealthy-cyberattacks/</loc>
		<lastmod>2025-05-29T13:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/certified-randomness-uses-quantum-cryptography-to-make-stronger-keys/</loc>
		<lastmod>2025-05-29T13:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-soar-siem-implementation-guidance/</loc>
		<lastmod>2025-05-29T13:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-asus-routers-hijacked-in-stealthy-backdoor-campaign/</loc>
		<lastmod>2025-05-29T13:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-ebook-die-zukunft-der-ki-basierten-cybersicherheit-die-drei-dimensionen-von-cybersicherheit-und-ki/</loc>
		<lastmod>2025-05-29T13:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fullscreen-bitm-attack-discovered-by-squarex-exploits-browser-fullscreen-apis-to-steal-credentials-in-safari/</loc>
		<lastmod>2025-05-29T14:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unmasking-ech-why-dnsthe-root-of-trust-holds-the-key-to-secure-connectivity/</loc>
		<lastmod>2025-05-29T14:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/even-5m-a-year-cant-keep-top-cisos-happy/</loc>
		<lastmod>2025-05-29T14:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-llms-dont-pass-the-security-sniff-test/</loc>
		<lastmod>2025-05-29T14:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-cbo-on-embracing-ai-in-security-next-gen-siem-transformation/</loc>
		<lastmod>2025-05-29T14:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-positioned-to-outpace-competitors-in-ai-era-ceo-tomer-weingarten/</loc>
		<lastmod>2025-05-29T14:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-exploit-google-calendar-in-cyberattacks-on-governments/</loc>
		<lastmod>2025-05-29T14:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-can-bluster-and-bluff-all-he-wants-but-iphone-manufacturing-isnt-coming-to-the-us/</loc>
		<lastmod>2025-05-29T14:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fullscreen-bitm-attack-discovered-by-squarex-exploits-browser-fullscreen-apis-to-steal-credentials-in-safari-2/</loc>
		<lastmod>2025-05-29T14:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-spotted-corrupts-its-own-headers-to-block-analysis/</loc>
		<lastmod>2025-05-29T14:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-antivirus-vs-mcafee-which-is-better-for-your-pc-security/</loc>
		<lastmod>2025-05-29T14:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-partner-hackers-leverage-fake-ai-vpn-and-crypto-sites-to-target-macos-and-windows-users/</loc>
		<lastmod>2025-05-29T14:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fullscreen-bitm-attack-discovered-by-squarex-exploits-browser-fullscreen-apis-to-steal-credentials-in-safari-3/</loc>
		<lastmod>2025-05-29T14:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-microsoft-entra-connect-update-replaces-legacy-login-methods/</loc>
		<lastmod>2025-05-29T14:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pumabot-hijacks-iot-devices-via-ssh-brute-force-for-persistent-access/</loc>
		<lastmod>2025-05-29T14:05:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-browser-exploit-technique-undermines-phishing-detection/</loc>
		<lastmod>2025-05-29T14:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-analysis-reveals-sophisticated-rat-with-corrupted-headers/</loc>
		<lastmod>2025-05-29T14:07:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widerspruch-fur-kunftige-beitrage-meta-ai-frist-verpasst-das-konnen-sie-jetzt-noch-tun/</loc>
		<lastmod>2025-05-29T14:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-website-down-as-company-investigates-security-incident/</loc>
		<lastmod>2025-05-29T15:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-decade-in-bootstrapped-thinkst-canary-reaches-20m-in-arr-without-vc-funding/</loc>
		<lastmod>2025-05-29T15:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-ai-hype-to-spread-ransomware-malware/</loc>
		<lastmod>2025-05-29T15:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-mapping-your-attack-surface-are-you/</loc>
		<lastmod>2025-05-29T15:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-inlong-jdbc-vulnerability-enables-deserialization-of-untrusted-data/</loc>
		<lastmod>2025-05-29T15:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-ip-set-to-make-its-debut-at-infosecurity-europe-2025/</loc>
		<lastmod>2025-05-29T15:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-file-explorer-vulnerability-enables-ntlm-hash-theft/</loc>
		<lastmod>2025-05-29T15:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-defensedepth-approach-for-the-modern-era/</loc>
		<lastmod>2025-05-29T15:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-windows-rat-evades-detection-for-weeks-using-corrupted-dos-and-pe-headers/</loc>
		<lastmod>2025-05-29T15:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grose-studie-von-cisco-es-gibt-weniger-cyberangriffe-doch-diese-verursachen-mehr-schaden/</loc>
		<lastmod>2025-05-29T15:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/streamline-sca-with-sonatypes-build-safe-automation/</loc>
		<lastmod>2025-05-29T16:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-authenticator-phases-out-password-features-and-apple-watch-support/</loc>
		<lastmod>2025-05-29T16:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/19-billion-passwords-leaked-protect-yourself-from-cyber-threats/</loc>
		<lastmod>2025-05-29T16:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/k0s-enters-cncf-sandbox-a-new-lightweight-kubernetes-option/</loc>
		<lastmod>2025-05-29T16:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-centralized-product-lifecycle-page-enhance-transparency-info/</loc>
		<lastmod>2025-05-29T16:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-backed-hackers-hiding-malware-in-calendar-events/</loc>
		<lastmod>2025-05-29T16:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-co-founder-sergey-brin-suggests-threatening-ai-for-better-results/</loc>
		<lastmod>2025-05-29T16:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-223m-cetus-exploit/</loc>
		<lastmod>2025-05-29T16:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-firm-linked-to-cyber-scams-behind-200-million-in-losses/</loc>
		<lastmod>2025-05-29T16:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2025-cybersecurity-pulse-report/</loc>
		<lastmod>2025-05-29T16:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-confirms-hack-very-small-number-of-customers-affected/</loc>
		<lastmod>2025-05-29T16:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-ghosting-the-third-step-in-breach-readiness/</loc>
		<lastmod>2025-05-29T17:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logonbox-vpn-2-4-12-now-available/</loc>
		<lastmod>2025-05-29T17:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/getting-ahead-of-ai-risk-what-comes-next-for-tenable/</loc>
		<lastmod>2025-05-29T17:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-shuts-down-website-in-response-to-security-incident/</loc>
		<lastmod>2025-05-29T17:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-asus-routers-compromised-in-sophisticated-hacking-campaign/</loc>
		<lastmod>2025-05-29T17:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guidepoint-security-surging-with-industry-giants-startups-were-always-early-adopters/</loc>
		<lastmod>2025-05-29T17:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/southeast-asian-provider-of-infrastructure-laundering-for-scams-is-sanctioned-by-us/</loc>
		<lastmod>2025-05-29T17:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8000-asus-routers-popped-in-advanced-mystery-botnet-plot/</loc>
		<lastmod>2025-05-29T17:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adversarial-ai-the-new-frontier-in-financial-cybersecurity/</loc>
		<lastmod>2025-05-29T17:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-s-website-offline-following-a-cyberattack/</loc>
		<lastmod>2025-05-29T17:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-chatgpt-and-invideo-ai-downloads-deliver-ransomware/</loc>
		<lastmod>2025-05-29T17:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gov-uk-wallet-open-to-public-sector-bodies/</loc>
		<lastmod>2025-05-29T17:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-biometric-surveillance-exists-in-legal-grey-area/</loc>
		<lastmod>2025-05-29T17:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-enhances-enterprise-security-with-ai-driven-threat-management/</loc>
		<lastmod>2025-05-29T17:05:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-abuse-google-apps-script-in-evasive-phishing-attacks/</loc>
		<lastmod>2025-05-29T17:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-safari-exposes-users-to-fullscreen-browserthe-middle-attacks/</loc>
		<lastmod>2025-05-29T17:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-target-ai-users-with-malware-loaded-installers-posing-as-popular-tools/</loc>
		<lastmod>2025-05-29T17:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-launches-next-gen-branch-office-security-boosting-threat-prevention-speed-by-4x/</loc>
		<lastmod>2025-05-29T17:06:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-hacker-seit-wochen-ddos-attacken-gegen-eine-alte-game-engine-durchfuhren/</loc>
		<lastmod>2025-05-29T17:06:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scientists-use-ai-chatbots-to-carry-encrypted-messages-undetectable-by-cybersecurity-systems/</loc>
		<lastmod>2025-05-29T18:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-opens-windows-update-to-3rd-party-apps/</loc>
		<lastmod>2025-05-29T18:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-government-sanctions-tech-company-involved-in-cyber-scams/</loc>
		<lastmod>2025-05-29T18:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-asus-routers-hit-by-persistent-backdoor/</loc>
		<lastmod>2025-05-29T18:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purehvnc-rat-uses-fake-job-offers-and-powershell-to-evade-security-defenses/</loc>
		<lastmod>2025-05-29T18:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-uses-nodesnake-rat-for-persistent-access-to-corporate-networks/</loc>
		<lastmod>2025-05-29T18:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pumabot-targets-linux-devices-in-latest-botnet-campaign/</loc>
		<lastmod>2025-05-29T18:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-surfaces-scope-of-identity-and-access-management-challenges/</loc>
		<lastmod>2025-05-29T19:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-author-has-appeared/</loc>
		<lastmod>2025-05-29T19:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-launches-kill-web-linking-cyber-operations-and-military/</loc>
		<lastmod>2025-05-29T19:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-swedish-mma-tournament-spotlights-the-trump-administrations-handling-of-far-right-terrorism/</loc>
		<lastmod>2025-05-29T19:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-nifty-com-infrastructure-in-sophisticated-phishing-attack/</loc>
		<lastmod>2025-05-29T19:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-with-new-pumabot-botnet-hit-linux-iot-devices/</loc>
		<lastmod>2025-05-29T20:09:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/craft-cms-exploit-facilitates-multiple-payload-delivery/</loc>
		<lastmod>2025-05-29T20:09:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-calendar-exploiting-apt41-attack-campaign-disrupted/</loc>
		<lastmod>2025-05-29T20:10:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/czech-ministry-attack-blamed-on-apt31/</loc>
		<lastmod>2025-05-29T20:10:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novel-nodesnake-rat-deployed-in-university-targeted-interlock-ransomware-intrusions/</loc>
		<lastmod>2025-05-29T20:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-industry-attacks-launched-by-earth-lamia-apt/</loc>
		<lastmod>2025-05-29T20:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-group-exploits-msps-rmm-software-in-attacks/</loc>
		<lastmod>2025-05-29T20:10:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-router-backdoors-affect-9k-devices-persist-after-firmware-updates/</loc>
		<lastmod>2025-05-29T20:12:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-skepticism-to-strategy-guiding-through-zero-trust-adoption-as-an-mssp/</loc>
		<lastmod>2025-05-29T20:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-security-risk-increases-as-transition-to-iam-platforms-lag/</loc>
		<lastmod>2025-05-29T20:12:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/channel-ma-managed-services-cybersecurity-compliance-spur-growth/</loc>
		<lastmod>2025-05-29T20:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-breached-in-cyberattack-linked-to-nation-state-hackers/</loc>
		<lastmod>2025-05-29T20:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-informs-360k-customers-of-third-party-data-leak/</loc>
		<lastmod>2025-05-29T20:13:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-os-root-and-path-traversal-vulnerabilities-go-1-24-detection-and-protection-methods-contrast-security/</loc>
		<lastmod>2025-05-29T20:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-says-nation-state-attack-targeted-multiple-screenconnect-customers/</loc>
		<lastmod>2025-05-29T20:05:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-sanctions-crypto-scam-facilitator-that-allegedly-stole-200m-from-us-victims/</loc>
		<lastmod>2025-05-29T20:05:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-shuts-down-website-following-unspecified-cyberattack/</loc>
		<lastmod>2025-05-29T20:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/changes-in-the-channel-people-moves-and-shakeups-may-26-30/</loc>
		<lastmod>2025-05-29T20:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recent-acquisitions-illustrate-consolidation-trends-in-cybersecurity/</loc>
		<lastmod>2025-05-29T20:06:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-rewritten-how-ai-is-fueling-both-sides-of-the-fight/</loc>
		<lastmod>2025-05-29T20:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vectra-ai-broadens-its-ai-agents-to-bolster-cybersecurity-for-customers/</loc>
		<lastmod>2025-05-29T20:06:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-ways-teams-can-comply-with-the-ftcs-godaddy-ruling/</loc>
		<lastmod>2025-05-29T20:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vista-equity-to-acquire-acumatica-strengthening-push-into-ai-enabled-erp-for-mid-market/</loc>
		<lastmod>2025-05-29T20:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snyk-launches-ai-trust-platform-to-help-developers-secure-ai-powered-code/</loc>
		<lastmod>2025-05-29T20:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-and-compliance-now-decide-who-makes-the-vendor-shortlist/</loc>
		<lastmod>2025-05-29T20:07:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/horizon3-ai-raises-fresh-capital-to-expand-ai-driven-security-operations/</loc>
		<lastmod>2025-05-29T20:07:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/precise-geolocation-data-trade-prohibited-in-oregon/</loc>
		<lastmod>2025-05-29T20:07:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-ransomware-victimization-remains-elevated/</loc>
		<lastmod>2025-05-29T20:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/misconfigurations-leak-over-1-6m-e-commerce-customers-data/</loc>
		<lastmod>2025-05-29T20:08:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-heist-pilfers-over-12m-from-cork-protocol/</loc>
		<lastmod>2025-05-29T20:08:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salvation-army-purportedly-subjected-to-chaos-ransomware-attack/</loc>
		<lastmod>2025-05-29T20:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-to-acquire-apex-security-expanding-exposure-management-for-ai-driven-threats/</loc>
		<lastmod>2025-05-29T20:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-party-hack-compromises-38k-uchicago-medicine-medical-group-patients/</loc>
		<lastmod>2025-05-29T20:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-364k-impacted-by-lexisnexis-breach/</loc>
		<lastmod>2025-05-29T20:09:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-screenconnect-infrastructure-hack-confirmed/</loc>
		<lastmod>2025-05-29T20:09:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-compromise-likely-with-microsoft-entra-id-design-issue/</loc>
		<lastmod>2025-05-29T20:09:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-hit-by-security-incident-after-attacks-on-uk-retailers/</loc>
		<lastmod>2025-05-29T21:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-open-letter-on-third-party-software-risk-is-a-call-to-action/</loc>
		<lastmod>2025-05-29T21:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-bottleneck-to-business-enabler-making-pki-work-for-digital-transformation/</loc>
		<lastmod>2025-05-29T21:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-china-deep-in-us-networks-theyre-preparing-for-war-hr-mcmaster-tells-lawmakers/</loc>
		<lastmod>2025-05-29T21:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-spanish-hacker-alcasec-back-in-the-jailhouse/</loc>
		<lastmod>2025-05-29T21:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/florida-health-system-pays-800k-for-insider-record-snooping/</loc>
		<lastmod>2025-05-29T21:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-reports-services-are-back-online-after-global-outage/</loc>
		<lastmod>2025-05-29T21:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscalers-buyout-of-red-canary-shows-telemetrys-value/</loc>
		<lastmod>2025-05-29T21:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-diesem-neuen-playstation-handheld-will-sony-der-switch-2-konkurrenz-machen-laut-leak/</loc>
		<lastmod>2025-05-29T21:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/parties-behind-2024-biden-ai-robocall-reach-deal-in-lawsuit/</loc>
		<lastmod>2025-05-29T22:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiffany-dior-suffer-south-korean-customer-data-breaches/</loc>
		<lastmod>2025-05-29T22:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/covenant-health-dealing-with-cyberattack-affecting-hospitals/</loc>
		<lastmod>2025-05-29T22:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-9000-routers-hijacked-asus-users-caught-in-ongoing-cyber-operation/</loc>
		<lastmod>2025-05-29T22:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-laptop-farm-scam-something-wed-never-seen-before/</loc>
		<lastmod>2025-05-29T22:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-goes-offline-after-incident-claims/</loc>
		<lastmod>2025-05-29T22:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-botnet-plants-persistent-backdoors-in-asus-routers/</loc>
		<lastmod>2025-05-29T22:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-mcp-the-new-protocol-reshaping-ai-agent-security/</loc>
		<lastmod>2025-05-29T23:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outage-disrupts-some-sentinelone-services/</loc>
		<lastmod>2025-05-29T23:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poisoned-models-in-fake-alibaba-sdks-show-challenges-of-securing-ai-supply-chains/</loc>
		<lastmod>2025-05-29T23:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-act-frank-lange-sieht-herausforderungen-und-chancen-fur-unternehmen/</loc>
		<lastmod>2025-05-29T23:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attack-surface-management-unverzichtbar-asm-hilft-online-angriffsflachen-zu-erkennen-zu-bewerten-und-zu-minimieren/</loc>
		<lastmod>2025-05-29T23:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-fordert-robuste-cybersicherheit-fur-die-energieversorgung/</loc>
		<lastmod>2025-05-29T23:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-may-patch-tuesday-update-fails-on-some-windows-11-vms/</loc>
		<lastmod>2025-05-29T23:03:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-how-to-build-a-platform-based-defense-against-evolving-cyber-threats/</loc>
		<lastmod>2025-05-29T23:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-bolsters-ai-controls-with-apex-security-acquisition/</loc>
		<lastmod>2025-05-29T23:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-new-siem-guidance-tackles-visibility-and-blind-spots/</loc>
		<lastmod>2025-05-29T23:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt41-uses-google-calendar-events-for-c2/</loc>
		<lastmod>2025-05-29T23:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-zscalers-acquisition-of-red-canary-matters-to-your-cybersecurity-strategy/</loc>
		<lastmod>2025-05-30T00:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-to-become-leading-player-in-the-soc-market-with-red-canary-deal-ceo-jay-chaudhry/</loc>
		<lastmod>2025-05-30T00:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-veteran-landon-scott-takes-over-as-channel-chief/</loc>
		<lastmod>2025-05-30T00:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-trust-through-effective-nhi-management/</loc>
		<lastmod>2025-05-30T04:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unlocking-powerful-benefits-with-nhis/</loc>
		<lastmod>2025-05-30T04:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feel-supported-by-your-nhi-security-team/</loc>
		<lastmod>2025-05-30T04:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-new-soar-guidance-shows-where-automation-must-go-next/</loc>
		<lastmod>2025-05-30T04:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-unyielding-scattered-spider/</loc>
		<lastmod>2025-05-30T04:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-passwordscon-we-removed-passwords-now-what/</loc>
		<lastmod>2025-05-30T04:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logonbox-sspr-2-4-12-now-available/</loc>
		<lastmod>2025-05-30T04:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warning-threat-actors-now-abusing-google-apps-script-in-phishing-attacks/</loc>
		<lastmod>2025-05-30T04:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-screenconnect-targeted-by-nation-state-actor/</loc>
		<lastmod>2025-05-30T04:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt41-uses-google-calendar-as-covert-c2-in-stealthy-cyberespionage-campaign/</loc>
		<lastmod>2025-05-30T04:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-outfit-sentinelones-services-back-online-after-lengthy-outage/</loc>
		<lastmod>2025-05-30T04:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-gut-host-behind-pig-butchering-scams-that-bilked-200m-from-americans/</loc>
		<lastmod>2025-05-30T04:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-releases-firefox-139-0-1-update-to-fix-artifacts-on-nvidia-gpus/</loc>
		<lastmod>2025-05-30T04:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-authenticator-now-warns-to-export-passwords-before-july-cutoff/</loc>
		<lastmod>2025-05-30T04:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-owasp-top-10-vulnerabilities/</loc>
		<lastmod>2025-05-30T05:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-fur-kinder-und-jugendliche-couragiert-im-digitalen-raum/</loc>
		<lastmod>2025-05-30T05:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-console-access-restored-after-global-platform-outage/</loc>
		<lastmod>2025-05-30T05:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exchange-2016-2019-support-ends-soon-what-it-should-do-to-stay-secure/</loc>
		<lastmod>2025-05-30T05:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec-products-of-the-month-may-2025/</loc>
		<lastmod>2025-05-30T05:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-disrupts-influence-ops-targeting-romania-azerbaijan-and-taiwan-with-fake-personas/</loc>
		<lastmod>2025-05-30T05:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attack-surface-management-online-angriffsflachen-erkennen-bewerten-und-minimieren/</loc>
		<lastmod>2025-05-30T06:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-ai-to-outsmart-ai-driven-phishing-scams/</loc>
		<lastmod>2025-05-30T06:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-have-access-to-key-data-across-the-enterprise/</loc>
		<lastmod>2025-05-30T06:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-group-extorts-global-orgs-via-saps-hr-tool/</loc>
		<lastmod>2025-05-30T06:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pwn2own-berlin-2025-sicherheitsforscher-decken-28-zero-day-schwachstellen-auf/</loc>
		<lastmod>2025-05-30T06:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-entfesselt-den-machtkampf-im-cyber-untergrund/</loc>
		<lastmod>2025-05-30T07:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-fordert-robuste-cybersicherheit-fur-die-energieversorgung-2/</loc>
		<lastmod>2025-05-30T07:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-windows-11-and-server-2025-what-cisos-should-know-about-the-latest-updates/</loc>
		<lastmod>2025-05-30T07:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schulbezirk-in-pennsylvania-usa-von-cyberangriff-auf-it-dienstleister-betroffen/</loc>
		<lastmod>2025-05-30T07:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krankenhaus-betreiber-in-grosbritannien-von-cyberangriff-auf-mobile-device-management-betroffen/</loc>
		<lastmod>2025-05-30T07:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krankenhaus-betreiber-in-grosbritannien-von-cyberangriff-auf-mobile-device-management-betroffen-2/</loc>
		<lastmod>2025-05-30T07:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versicherungsunternehmen-in-singapur-von-cyberangriff-auf-einen-dienstleister-betroffen/</loc>
		<lastmod>2025-05-30T07:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-privacy-in-blockchain-must-start-with-open-source/</loc>
		<lastmod>2025-05-30T07:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-tomcat-cgi-servlet-flaw-enables-security-constraint-bypass/</loc>
		<lastmod>2025-05-30T07:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-recovers-platform-back-online-after-extended-outage/</loc>
		<lastmod>2025-05-30T07:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-hit-by-cyberattack-nation-state-actor-suspected-in-targeted-breach/</loc>
		<lastmod>2025-05-30T07:05:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-und-datenmanagement-in-der-cybersicherheit-sicherheitsrelevante-daten-aufspuren-anreichern-und-auswerten/</loc>
		<lastmod>2025-05-30T07:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obrela-nennt-die-wichtigsten-kriterien-bei-der-auswahl-eines-mdr-dienstleisters/</loc>
		<lastmod>2025-05-30T07:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kb5058405-update-panne-macht-windows-11-systeme-kaputt/</loc>
		<lastmod>2025-05-30T08:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-us-data-privacy-framework-warum-unternehmen-sich-beim-datenschutz-nicht-auf-washington-verlassen-durfen/</loc>
		<lastmod>2025-05-30T08:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-ausenministerium-alarmiert-nato-und-eu/</loc>
		<lastmod>2025-05-30T08:07:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-hit-by-advanced-cyberattack-internal-data-at-risk/</loc>
		<lastmod>2025-05-30T08:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-what-you-need-to-know/</loc>
		<lastmod>2025-05-30T09:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-uk-wants-you-to-sign-up-for-1b-cyber-defense-force/</loc>
		<lastmod>2025-05-30T09:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-ios-xe-flaw-permits-arbitrary-file-upload-poc-released/</loc>
		<lastmod>2025-05-30T09:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-it-workers-exploit-legitimate-software-and-network-tactics-to-evade-edr/</loc>
		<lastmod>2025-05-30T09:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-rust-based-infostealer-uses-fake-captcha-to-deliver-eddiestealer/</loc>
		<lastmod>2025-05-30T09:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urged-to-enrich-kev-catalog-with-more-contextual-data/</loc>
		<lastmod>2025-05-30T09:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheitskennzeichen-fur-gesamtes-iot-sortiment-axis-verstarkt-engagement-in-cybersicherheit/</loc>
		<lastmod>2025-05-30T09:04:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defense-in-depth-so-konnen-unternehmen-eine-mehrschichtige-cybersicherheitsstrategie-aufbauen/</loc>
		<lastmod>2025-05-30T09:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-watchdog-put-cops-on-naughty-step-for-lost-cctv-footage/</loc>
		<lastmod>2025-05-30T10:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-suffered-a-cyberattack-carried-out-by-a-sophisticated-nation-state-actor/</loc>
		<lastmod>2025-05-30T10:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-js-dev-server-vulnerability-leads-to-developer-data-exposure/</loc>
		<lastmod>2025-05-30T10:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-sanctions-funnull-for-200m-romance-baiting-scams-tied-to-crypto-fraud/</loc>
		<lastmod>2025-05-30T10:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-mod-launches-new-cyber-warfare-command/</loc>
		<lastmod>2025-05-30T10:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schleudersitz-ciso-diese-fehltritte-kosten-cisos-haufig-den-kopf/</loc>
		<lastmod>2025-05-30T10:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-ade-ki-tool-ortet-youtube-nutzer-anhand-ihrer-kommentare/</loc>
		<lastmod>2025-05-30T10:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safari-flaw-exploited-by-bitm-attack-to-steal-user-login-data/</loc>
		<lastmod>2025-05-30T10:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novel-pumabot-slips-into-iot-surveillance-with-stealthy-ssh-break-ins/</loc>
		<lastmod>2025-05-30T11:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/void-blizzard-nimmt-nato-organisationen-ins-visier/</loc>
		<lastmod>2025-05-30T11:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwortlose-authentifizierung-wird-fur-cisos-immer-wichtiger/</loc>
		<lastmod>2025-05-30T11:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crims-defeat-human-intelligence-with-fake-ai-installers-they-poison-with-ransomware/</loc>
		<lastmod>2025-05-30T11:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-phishing-service-haozi-resurfaces-fueling-criminal-profits/</loc>
		<lastmod>2025-05-30T11:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponized-pypi-package-executes-supply-chain-attack-to-steal-solana-private-keys/</loc>
		<lastmod>2025-05-30T11:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novel-malware-evades-detection-by-skipping-pe-header-in-windows/</loc>
		<lastmod>2025-05-30T11:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-flags-philippines-tech-company-behind-crypto-scam-infrastructure/</loc>
		<lastmod>2025-05-30T11:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dreamteam-ki-und-cloud-grenzen-zwischen-cloud-und-edge-computing-verschwimmen/</loc>
		<lastmod>2025-05-30T11:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategies-for-enhancing-your-organizations-cyber-resilience/</loc>
		<lastmod>2025-05-30T12:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sommerurlaub-2025-voraus-7-knowbe4-cybersicherheitstipps-fur-reisen/</loc>
		<lastmod>2025-05-30T12:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-apache-inlong-vulnerability-cve-2025-27522-exposes-systems-to-remote-code-execution-risks/</loc>
		<lastmod>2025-05-30T12:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-model-modifies-shutdown-script-in-apparent-sabotage-effort/</loc>
		<lastmod>2025-05-30T12:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-us-website-restored-after-security-incident/</loc>
		<lastmod>2025-05-30T12:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-treasury-sanctioned-the-firm-funnull-technology-as-major-cyber-scam-facilitator/</loc>
		<lastmod>2025-05-30T12:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-exploit-sap-and-sql-server-flaws-in-attacks-across-asia-and-brazil/</loc>
		<lastmod>2025-05-30T12:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-the-department-of-no-to-a-culture-of-yes-a-healthcare-cisos-journey-to-enabling-modern-care/</loc>
		<lastmod>2025-05-30T12:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-ai-generated-videos-on-tiktok-to-spread-info-stealing-malware/</loc>
		<lastmod>2025-05-30T12:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarstrom-router-und-staatlich-gelenkte-hacktivisten-cyberangriffe-auf-vernetzte-infrastrukturen-nehmen-2025-rasant-zu/</loc>
		<lastmod>2025-05-30T12:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-warum-chatgpt-oft-den-gesamten-onedrive-ordner-lesen-kann/</loc>
		<lastmod>2025-05-30T12:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-moves-to-acquire-red-canary-mdr-service/</loc>
		<lastmod>2025-05-30T13:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-swipe-to-scare-data-privacy-and-cyber-security-concerns-in-dating-apps/</loc>
		<lastmod>2025-05-30T13:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-arcona-hotels/</loc>
		<lastmod>2025-05-30T13:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-incident-disrupts-internet-for-thousands-in-moscow/</loc>
		<lastmod>2025-05-30T13:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-ransomware-victims-now-must-tell-the-government-if-they-pay-up/</loc>
		<lastmod>2025-05-30T13:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/games-of-the-future-2025-phygital-international-bestatigt-abu-dhabi-als-austragungsort/</loc>
		<lastmod>2025-05-30T13:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-migration-demands-contractual-safeguards-and-clear-strategy/</loc>
		<lastmod>2025-05-30T13:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-study-uncovers-multiple-vulnerabilities-in-wechat-and-im-apps/</loc>
		<lastmod>2025-05-30T13:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mici-netfax-server-flaws-allow-attackers-to-execute-remote-code/</loc>
		<lastmod>2025-05-30T13:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-cisa-urge-organizations-to-secure-data-used-in-ai-models/</loc>
		<lastmod>2025-05-30T13:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-datenleck-auf-adidas-kunden-kommen-spam-und-phishing-zu/</loc>
		<lastmod>2025-05-30T13:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evaluating-the-security-efficacy-of-web-application-firewalls-wafs/</loc>
		<lastmod>2025-05-30T14:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-botnet-hijacks-ai-powered-security-tool-on-asus-routers/</loc>
		<lastmod>2025-05-30T14:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/damascened-peacock-russian-hackers-targeted-uk-ministry-of-defence/</loc>
		<lastmod>2025-05-30T14:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-claims-tiktok-breach-puts-428-million-records-up-for-sale/</loc>
		<lastmod>2025-05-30T14:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-sentinelone-suffers-major-outage/</loc>
		<lastmod>2025-05-30T14:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noisy-quantum-hardware-could-crack-rsa-2048-in-seven-days/</loc>
		<lastmod>2025-05-30T14:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cops-in-germany-claim-theyve-idd-the-mysterious-trickbot-ransomware-kingpin/</loc>
		<lastmod>2025-05-30T14:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-icinga-2-vulnerability-allows-attackers-to-obtain-valid-certificates/</loc>
		<lastmod>2025-05-30T14:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-gh0st-rat-to-hijack-internet-cafa-systems-for-crypto-mining/</loc>
		<lastmod>2025-05-30T14:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-security-update-for-22h2-23h2-may-cause-recovery-errors/</loc>
		<lastmod>2025-05-30T14:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-to-acquire-ai-security-startup-apex/</loc>
		<lastmod>2025-05-30T14:05:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-stature-rises-but-security-budgets-remain-tight/</loc>
		<lastmod>2025-05-30T14:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-code-red-to-rust-microsofts-security-journey/</loc>
		<lastmod>2025-05-30T14:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-banks-urge-sec-to-repeal-cyber-disclosure-rule/</loc>
		<lastmod>2025-05-30T14:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krieg-nokia-und-rheinmetall-tochter-bauen-5g-militarnetze/</loc>
		<lastmod>2025-05-30T14:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-says-it-disrupted-influence-operations-linked-to-china-iran-romania/</loc>
		<lastmod>2025-05-30T15:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-microsoft-entra-billing-roles-to-escalate-privileges/</loc>
		<lastmod>2025-05-30T15:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlechtes-preis-leistungs-verhaltnis-cios-sind-enttauscht-von-security-systemen/</loc>
		<lastmod>2025-05-30T15:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-reveals-techniques-for-defending-against-evolving-aitm-attacks/</loc>
		<lastmod>2025-05-30T15:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smarter-defenses-how-ai-improves-security-for-low-no-code-and-vibe-coded-applications/</loc>
		<lastmod>2025-05-30T15:07:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-security-guru-picks-for-infosecurity-europe-2025/</loc>
		<lastmod>2025-05-30T15:07:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pure-crypter-uses-multiple-evasion-methods-to-bypass-windows-11-24h2-security-features/</loc>
		<lastmod>2025-05-30T15:10:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-warns-of-threat-activity-linked-to-suspected-nation-state-hackers/</loc>
		<lastmod>2025-05-30T16:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-military-it-specialist-arrested-for-allegedly-trying-to-leak-secrets-to-foreign-government/</loc>
		<lastmod>2025-05-30T16:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-are-we-less-secure-despite-the-ai-buzz/</loc>
		<lastmod>2025-05-30T16:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-payment-or-anarchy-ai-gets-purchasing-power/</loc>
		<lastmod>2025-05-30T16:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-google-apps-script-to-host-phishing-sites/</loc>
		<lastmod>2025-05-30T16:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dadsec-hacker-group-uses-tycoon2fa-infrastructure-to-steal-office365-credentials/</loc>
		<lastmod>2025-05-30T16:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-weaponized-ai-tool-installers-infect-devices-with-ransomware/</loc>
		<lastmod>2025-05-30T16:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-changed-the-development-process/</loc>
		<lastmod>2025-05-30T16:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-breached-screenconnect-customers-targeted/</loc>
		<lastmod>2025-05-30T16:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-eddiestealer-malware-bypasses-chromes-app-bound-encryption-to-steal-browser-data/</loc>
		<lastmod>2025-05-30T16:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandatory-ransomware-payment-disclosure-begins-in-australia/</loc>
		<lastmod>2025-05-30T16:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-take9-wont-improve-cybersecurity-2/</loc>
		<lastmod>2025-05-30T17:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eight-things-we-learned-from-whatsapp-vs-nso-group-spyware-lawsuit/</loc>
		<lastmod>2025-05-30T17:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-investigating-how-trumps-chief-of-staffs-phone-was-hacked/</loc>
		<lastmod>2025-05-30T17:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-yep-facebook-meta-is-now-a-defense-contractor/</loc>
		<lastmod>2025-05-30T17:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosecurity-europe-2025-drives-cybersecurity-priorities-amid-growing-global-risks/</loc>
		<lastmod>2025-05-30T17:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-zero-day-vulnerability-discovered-using-frontier-ai/</loc>
		<lastmod>2025-05-30T17:03:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-doxxes-conti-ransomware-and-trickbot-ring-leader/</loc>
		<lastmod>2025-05-30T17:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/getting-exposure-management-right-insights-from-500-cisos/</loc>
		<lastmod>2025-05-30T17:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-passwordscon-cloud-attack-dissecting-attack-paths-with-graph-mode/</loc>
		<lastmod>2025-05-30T18:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senators-call-on-trump-admin-to-reinstate-cyber-review-board-for-salt-typhoon-investigation/</loc>
		<lastmod>2025-05-30T18:03:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-senate-democrats-call-on-dhs-to-reinstate-cyber-safety-review-board-membership/</loc>
		<lastmod>2025-05-30T18:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defend-your-business-mastering-cybersecurity-awareness-against-teams-phishing-social-engineering/</loc>
		<lastmod>2025-05-30T18:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-medical-org-pays-50m-to-settle-case-after-crims-raided-data-and-threatened-to-swat-cancer-patients/</loc>
		<lastmod>2025-05-30T18:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-crash-dump-flaws-expose-passwords-encryption-keys/</loc>
		<lastmod>2025-05-30T18:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/genetic-data-emerging-cyberthreats-and-privacy-concerns/</loc>
		<lastmod>2025-05-30T18:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-takes-down-avcheck-site-used-by-cybercriminals-to-scan-malware/</loc>
		<lastmod>2025-05-30T18:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-microsoft-entra-billing-roles-to-escalate-privileges-in-organizational-environments/</loc>
		<lastmod>2025-05-30T18:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/million-dollar-salaries-board-influence-mark-the-cisos-rise/</loc>
		<lastmod>2025-05-30T19:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-hallucinations-are-the-biggest-threat-to-gen-ais-adoption-in-enterprises/</loc>
		<lastmod>2025-05-30T19:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-democrats-urge-dhs-to-reconstitute-csrb/</loc>
		<lastmod>2025-05-30T19:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-arrest-dod-techie-claim-he-dumped-top-secret-files-in-park-for-foreign-spies-to-find/</loc>
		<lastmod>2025-05-30T19:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepseek-upgrade-edges-model-closer-to-ais-frontline/</loc>
		<lastmod>2025-05-30T19:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-now-testing-notepad-text-formatting-in-windows-11/</loc>
		<lastmod>2025-05-30T19:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-outage-leaves-security-teams-hanging-for-six-hours/</loc>
		<lastmod>2025-05-30T20:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hospitals-in-maine-new-hampshire-limit-services-after-cyberattack-on-catholic-health-org/</loc>
		<lastmod>2025-05-30T20:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-intelligence-employee-arrested-for-alleged-double-dealing-of-classified-info/</loc>
		<lastmod>2025-05-30T20:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-customers-get-mysterious-warning-about-sophisticated-nation-state-hack/</loc>
		<lastmod>2025-05-30T20:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preview-hot-sessions-at-infosecurity-europe-2025-in-london/</loc>
		<lastmod>2025-05-30T20:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-hacker-may-have-deepfaked-trumps-chief-of-staff-in-a-phishing-campaign/</loc>
		<lastmod>2025-05-30T20:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-are-exploiting-critical-flaw-in-vbulletin-forum-software/</loc>
		<lastmod>2025-05-30T20:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-filipino-tech-company-running-sprawling-crypto-scams/</loc>
		<lastmod>2025-05-30T20:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spy-catcher-saw-stupid-tech-errors-others-made-fbi-says-he-then-made-his-own/</loc>
		<lastmod>2025-05-30T21:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-connectwise-believed-to-be-nation-state-threat-actor/</loc>
		<lastmod>2025-05-30T21:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/get-prepared-for-continued-cyberattacks-on-retailers/</loc>
		<lastmod>2025-05-30T21:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rising-role-of-cloud-based-siem-in-mdr/</loc>
		<lastmod>2025-05-30T21:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-security-training-isnt-wrong-the-content-is-just-outdated/</loc>
		<lastmod>2025-05-30T21:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudzero-secures-56m-to-tackle-ai-era-cloud-cost-challenges/</loc>
		<lastmod>2025-05-30T21:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-teams-show-business-value-amid-declining-investment-report-finds/</loc>
		<lastmod>2025-05-30T21:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-imminent-end-of-authenticators-password-autofill-feature/</loc>
		<lastmod>2025-05-30T21:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-spoofing-attacks-could-compromise-most-leading-email-domains/</loc>
		<lastmod>2025-05-30T21:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaiser-permanente-dismisses-cyberattack-after-widespread-outage/</loc>
		<lastmod>2025-05-30T21:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unimed-platform-misconfiguration-exposes-14m-patient-doctor-communications/</loc>
		<lastmod>2025-05-30T21:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-tomcat-security-defenses-potentially-evaded-with-cgi-servlet-bug/</loc>
		<lastmod>2025-05-30T21:06:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fullscreen-bitm-intrusions-possible-with-safari-flaw/</loc>
		<lastmod>2025-05-30T21:06:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purehvnc-rat-distributed-via-job-lures-in-new-phishing-attack/</loc>
		<lastmod>2025-05-30T21:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corrupted-headers-conceal-novel-windows-rat/</loc>
		<lastmod>2025-05-30T21:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netbird-malware-spread-in-advanced-finance-exec-targeted-spear-phishing/</loc>
		<lastmod>2025-05-30T21:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-phishing-campaign-powered-by-nifty-infrastructure/</loc>
		<lastmod>2025-05-30T21:07:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credential-phishing-facilitated-by-google-apps-script-exploitation/</loc>
		<lastmod>2025-05-30T21:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-payloads-deployed-via-fake-ai-tool-installers/</loc>
		<lastmod>2025-05-30T21:07:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-romance-baiting-scam-facilitator-subjected-to-us-sanctions/</loc>
		<lastmod>2025-05-30T21:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evolving-attacks-by-the-utg015-hacking-operation-detailed/</loc>
		<lastmod>2025-05-30T21:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-million-dollar-ciso-report-reveals-high-pay-low-satisfaction/</loc>
		<lastmod>2025-05-30T21:09:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/earth-lamia-exploits-known-sql-rce-bugs-across-asia/</loc>
		<lastmod>2025-05-30T21:09:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usda-worker-5-others-charged-in-food-stamp-fraud-operation/</loc>
		<lastmod>2025-05-30T22:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-insights-with-contrast-ciso-david-lindner-05-30-25/</loc>
		<lastmod>2025-05-30T22:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-stopped-covert-operations-from-iran-china-and-romania-spreading-propaganda/</loc>
		<lastmod>2025-05-30T22:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-romance-bait-scam-digital-infrastructure-host/</loc>
		<lastmod>2025-05-30T22:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-supply-chain-security-tools-take-on-toil-for-users/</loc>
		<lastmod>2025-05-30T22:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-businesses-lag-behind-in-cyber-resilience-as-threats-escalate/</loc>
		<lastmod>2025-05-30T22:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moving-on-has-never-been-so-simple-msps-ices-solutions-part-3/</loc>
		<lastmod>2025-05-30T23:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-counter-antivirus-service-disrupted-in-global-takedown/</loc>
		<lastmod>2025-05-30T23:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/games-of-the-future-2025-phygital-international-confirms-abu-dhabi-as-the-venue/</loc>
		<lastmod>2025-05-30T23:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-report-beinahe-200-000-phishing-angriffe-die-methoden/</loc>
		<lastmod>2025-05-30T23:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-netskope-palo-alto-top-sse-gartner-magic-quadrant/</loc>
		<lastmod>2025-05-30T23:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chatgpt-scam-infects-users-with-ransomware-exercise-extreme-caution/</loc>
		<lastmod>2025-05-30T23:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sina-cloud-security-layer-erhalt-bsi-zulassung/</loc>
		<lastmod>2025-05-30T23:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-sequential-kill-chain-for-ai-firetail-blog/</loc>
		<lastmod>2025-05-31T00:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cloud-vulnerabilities-in-fintech-and-how-to-fix-them/</loc>
		<lastmod>2025-05-31T00:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-passwordscon-all-your-badge-are-belong-to-me/</loc>
		<lastmod>2025-05-31T04:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitter-apt-targets-pakistan-telecom-amidst-border-tensions-with-new-cyberattack/</loc>
		<lastmod>2025-05-31T04:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-new-standard-for-ai-system-security-published-while-study-finds-cyber-teams-boost-value-of-business-projects/</loc>
		<lastmod>2025-05-31T05:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manage-it-techtalk-so-profitieren-industrielle-unternehmen-von-zero-trust/</loc>
		<lastmod>2025-05-31T06:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phygital-international-confirms-abu-dhabi-as-the-venue-for-games-of-the-future-2025/</loc>
		<lastmod>2025-05-31T06:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-are-your-non-human-identities-in-the-cloud/</loc>
		<lastmod>2025-05-31T07:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-we-rely-on-current-secrets-management-solutions/</loc>
		<lastmod>2025-05-31T07:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empowering-your-team-with-strong-iam-practices/</loc>
		<lastmod>2025-05-31T07:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-you-anticipating-nhidr-threats-effectively/</loc>
		<lastmod>2025-05-31T07:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-banks-urged-to-beef-up-anti-fraud-systems-for-international-payments/</loc>
		<lastmod>2025-05-31T07:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-administrator-protection-angekundigt/</loc>
		<lastmod>2025-05-31T08:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-doj-seizes-4-domains-supporting-cybercrime-crypting-services-in-global-operation/</loc>
		<lastmod>2025-05-31T09:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-angst-vor-dem-schwachsten-glied-in-der-lieferkette-3/</loc>
		<lastmod>2025-05-31T10:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-introduces-bidirectional-one-time-sharing-feature-to-its-password-manager-platform/</loc>
		<lastmod>2025-05-31T11:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-flaws-allow-password-hash-theft-via-core-dumps-in-ubuntu-rhel-fedora/</loc>
		<lastmod>2025-05-31T11:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-einen-internet-anbieter-in-russland/</loc>
		<lastmod>2025-05-31T12:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-police-say-theyve-identified-trickbot-ransomware-kingpin/</loc>
		<lastmod>2025-05-31T14:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-kingpin-stern-apparently-ided-by-german-law-enforcement/</loc>
		<lastmod>2025-05-31T15:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ceo-frets-about-20-unemployment-from-ai-but-economists-are-doubtful/</loc>
		<lastmod>2025-05-31T15:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-deploys-new-nodesnake-rat-in-uk-attacks/</loc>
		<lastmod>2025-05-31T15:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsideslv24-keynotes-closing-ceremony/</loc>
		<lastmod>2025-05-31T16:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chaos-computer-club-legt-corplife-datenleck-offen/</loc>
		<lastmod>2025-05-31T16:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-linux-flaws-can-lead-to-the-disclosure-of-sensitive-data/</loc>
		<lastmod>2025-05-31T17:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-relic-enhances-software-reliability-with-github-copilot-integration/</loc>
		<lastmod>2025-05-31T18:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-alert-major-breaches-at-tiktok-and-ticketmaster/</loc>
		<lastmod>2025-05-31T18:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identiverse-2025-community-rallies-around-common-threats-and-issues/</loc>
		<lastmod>2025-05-31T21:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-used-to-spread-novel-rust-based-infostealer/</loc>
		<lastmod>2025-05-31T21:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-details-for-max-severity-cisco-ios-xe-flaw-now-public/</loc>
		<lastmod>2025-05-31T22:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unimed-in-brasilien-cybernews-warnt-vor-grosem-datenleck/</loc>
		<lastmod>2025-05-31T23:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oliver-sume-digitalsteuer-ware-schwerer-schlag-fur-die-digitalisierung-in-deutschland/</loc>
		<lastmod>2025-05-31T23:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bunnyshop-und-weitere-shops-offline-da-dienstleister-e-vendo-de-gehackt/</loc>
		<lastmod>2025-05-31T23:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bec-und-ftf-angriffe-groste-cybergefahr-in-2024/</loc>
		<lastmod>2025-05-31T23:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secrets-scanning-is-evolving-for-better-security/</loc>
		<lastmod>2025-06-01T00:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-innovation-driving-better-nhi-management/</loc>
		<lastmod>2025-06-01T00:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ensuring-safety-in-your-secrets-vaulting-techniques/</loc>
		<lastmod>2025-06-01T00:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scalable-strategies-for-managing-cloud-machine-identities/</loc>
		<lastmod>2025-06-01T00:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-ai-hat-gemini-als-datenhungrigsten-chatbot-abgelost/</loc>
		<lastmod>2025-06-01T04:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gesteuerte-scams-definieren-die-cyberkriminalitat-neu/</loc>
		<lastmod>2025-06-01T05:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dod-cyber-clause-flowdown-what-suppliers-must-do/</loc>
		<lastmod>2025-06-01T08:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-nist-proposes-new-vulnerabilities-metric-flaws-in-nasas-open-source-software/</loc>
		<lastmod>2025-06-01T09:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-zwischenfall-beim-justizministerium-von-puerto-rico/</loc>
		<lastmod>2025-06-01T11:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-526-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-06-01T11:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-gibt-praktische-tipps-fur-den-datenschutz-in-der-urlaubszeit/</loc>
		<lastmod>2025-06-01T11:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bunnyhop-und-weitere-shops-offline-da-dienstleister-e-vendo-de-gehackt/</loc>
		<lastmod>2025-06-01T13:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-47/</loc>
		<lastmod>2025-06-01T14:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/addressing-our-age-of-insecurity-in-cyber-too/</loc>
		<lastmod>2025-06-01T15:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-flaws-in-vbulletin-forum-software-are-under-attack/</loc>
		<lastmod>2025-06-01T15:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/future-proofing-your-enterprise-the-role-of-crypto-agile-pki-in-long-term-security/</loc>
		<lastmod>2025-06-01T22:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-pwn20wn-winners-announcement/</loc>
		<lastmod>2025-06-01T22:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-pwn20wn-winners-announcement-2/</loc>
		<lastmod>2025-06-01T22:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/laut-acronis-erkenntnissen-mehr-malware-und-weniger-ransomware-in-deutschland/</loc>
		<lastmod>2025-06-01T23:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-design-fehler-ermoglicht-user-group-policies-auszuhebeln/</loc>
		<lastmod>2025-06-01T23:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-angst-vor-dem-schwachsten-glied-cybersicherheit-in-der-lieferkette/</loc>
		<lastmod>2025-06-02T00:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flowables-smart-automation-tools-are-reshaping-how-enterprises-operate-in-2025/</loc>
		<lastmod>2025-06-02T00:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finding-stability-in-cloud-native-security-solutions/</loc>
		<lastmod>2025-06-02T04:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adobe-und-microsoft-sind-bei-cloud-phishing-die-beliebtesten-marken/</loc>
		<lastmod>2025-06-02T04:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metas-q1-2025-report-dismantling-covert-influence-campaigns-from-china-iran-and-romania/</loc>
		<lastmod>2025-06-02T04:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-knowledge-protokoll-was-sie-uber-zk-snark-wissen-sollten/</loc>
		<lastmod>2025-06-02T05:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-awareness-training-isnt-stopping-breaches-can-ai-help/</loc>
		<lastmod>2025-06-02T05:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/48-of-security-pros-are-falling-behind-compliance-requirements/</loc>
		<lastmod>2025-06-02T05:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-unternehmen-jetzt-auf-digitales-krisenmanagement-setzen-sollten/</loc>
		<lastmod>2025-06-02T06:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-gemeinde-in-brasilien-hoher-geldbetrag-gestohlen/</loc>
		<lastmod>2025-06-02T06:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-ein-medienunternehmen-in-norwegen/</loc>
		<lastmod>2025-06-02T06:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-zwischenfall-bei-einer-zulassungsbehorde-fur-rechtsanwalte-in-australien/</loc>
		<lastmod>2025-06-02T06:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-zwischenfall-bei-einem-gesundheitssystem-in-brasilien/</loc>
		<lastmod>2025-06-02T06:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-gesundheitsdienstleister-in-brasilien/</loc>
		<lastmod>2025-06-02T06:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/x-konto-einer-staatlichen-bank-in-bolivien-gehackt/</loc>
		<lastmod>2025-06-02T06:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-3-0-leading-ai-governance-and-security-in-the-boardroom/</loc>
		<lastmod>2025-06-02T06:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/review-metasploit-2nd-edition/</loc>
		<lastmod>2025-06-02T06:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionage-seit-2022-tschechien-ertappt-chinesische-hacker-auf-frischer-tat/</loc>
		<lastmod>2025-06-02T06:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-smarter-pentest-reporting-and-exposure-management-with-plextrac/</loc>
		<lastmod>2025-06-02T07:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-recruiter-emails-target-cfos-using-legit-netbird-tool-across-6-global-regions/</loc>
		<lastmod>2025-06-02T07:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-hardware-sicherheitsschlussel-gegen-phishing-helfen-ohne-phishing-resistente-nutzer-geht-nichts/</loc>
		<lastmod>2025-06-02T07:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manage-it-techtalk-so-lassen-sich-die-grosten-ot-sicherheitslecks-beheben/</loc>
		<lastmod>2025-06-02T08:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/severe-vulnerabilities-in-consilium-cs5000-fire-panels-allow-remote-system-takeover/</loc>
		<lastmod>2025-06-02T08:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mitre-releases-roadmap-for-transition-to-post-quantum-cryptography/</loc>
		<lastmod>2025-06-02T08:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-security-bugs-could-expose-password-hashes-across-millions-of-devices/</loc>
		<lastmod>2025-06-02T08:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-baut-observability-und-it-management-aus-solarwinds-starkt-operative-resilienz-mit-ki-und-systemansatz/</loc>
		<lastmod>2025-06-02T08:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ubernimmt-mdr-anbieter-red-canary/</loc>
		<lastmod>2025-06-02T08:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-24h2-powershell-applocker-wdac-script-enforcement-monate-kaputt/</loc>
		<lastmod>2025-06-02T09:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-cyberattack-hit-hospitals-operated-by-covenant-health/</loc>
		<lastmod>2025-06-02T09:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-published-a-detailed-analysis-of-cisco-ios-xe-wlc-flaw-cve-2025-20188/</loc>
		<lastmod>2025-06-02T09:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-roundcube-flaw-allows-remote-code-execution-by-attackers/</loc>
		<lastmod>2025-06-02T09:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-study-reveals-vulnerable-code-pattern-putting-github-projects-at-risk-of-path-traversal-attacks/</loc>
		<lastmod>2025-06-02T09:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutscher-rustungskonzern-cybergang-leakt-interne-daten-von-rheinmetall/</loc>
		<lastmod>2025-06-02T09:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/build-more-robust-ot-security-with-the-nist-framework/</loc>
		<lastmod>2025-06-02T10:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wegweiser-zur-din-spec-27076-standardisierter-it-sicherheitscheck-spart-zeit-und-minimiert-risiken/</loc>
		<lastmod>2025-06-02T10:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-lead-shut-down-of-counter-av-service-avcheck/</loc>
		<lastmod>2025-06-02T10:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdoors-in-python-and-npm-packages-target-windows-and-linux/</loc>
		<lastmod>2025-06-02T10:13:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-exploits-detected-targeting-critical-vbulletin-vulnerability/</loc>
		<lastmod>2025-06-02T10:13:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-hard-truths-security-pros-must-learn-to-live-with/</loc>
		<lastmod>2025-06-02T11:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-50000-azure-ad-users-access-tokens-exposed-via-unauthenticated-api-endpoint/</loc>
		<lastmod>2025-06-02T11:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-denodo-scheduler-flaw-allows-remote-code-execution-by-attackers/</loc>
		<lastmod>2025-06-02T11:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentar-von-karl-im-brahm-objectway-ki-boom-in-banken-so-bleiben-sensible-kundendaten-sicher/</loc>
		<lastmod>2025-06-02T11:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/regierungsdaten-in-den-socken-fbi-erwischt-spionagefahnder-bei-der-spionage/</loc>
		<lastmod>2025-06-02T11:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-levers-that-quietly-change-your-risk-and-how-to-spot-them/</loc>
		<lastmod>2025-06-02T12:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-ist-businessmail-compromise/</loc>
		<lastmod>2025-06-02T12:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-forciert-durch-die-ubernahme-von-red-canary-innovationen-im-bereich-ki-gestutzter-sicherheit/</loc>
		<lastmod>2025-06-02T12:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-weeks-top-breaches-stem-from-third-party-attacks/</loc>
		<lastmod>2025-06-02T12:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-weaponize-free-ssh-client-putty-to-deliver-malware-on-windows/</loc>
		<lastmod>2025-06-02T12:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-roles-take-on-strategic-security-leadership-roles-beyond-cybersecurity-as-organizations/</loc>
		<lastmod>2025-06-02T12:03:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-secret-defense-strategy-of-four-critical-industries-combating-advanced-cyber-threats/</loc>
		<lastmod>2025-06-02T12:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-fur-byod-und-nicht-verwaltete-gerate-wie-enterprise-browser-und-sse-gemeinsam-daten-wirksam-schutzen/</loc>
		<lastmod>2025-06-02T12:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hart-4-technology-vertreibt-apricorn-produkte-jetzt-auch-in-der-dach-region/</loc>
		<lastmod>2025-06-02T12:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-anrufe-bei-us-politikern-smartphone-von-trumps-stabschefin-gehackt/</loc>
		<lastmod>2025-06-02T12:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-fixes-three-adreno-gpu-zero-days-exploited-in-attacks/</loc>
		<lastmod>2025-06-02T12:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/haozis-plugplay-phishing-attack-steals-over-280000-from-users/</loc>
		<lastmod>2025-06-02T12:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pypi-supply-chain-attacks-target-python-and-npm-users-on-windows-and-linux/</loc>
		<lastmod>2025-06-02T12:04:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-community-bank-says-thieves-drained-customer-data-through-third-party-hole/</loc>
		<lastmod>2025-06-02T13:06:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maximize-your-minecraft-optimal-pc-setup-and-server-hosting-essentials/</loc>
		<lastmod>2025-06-02T13:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-artificial-intelligence-phishing-detection-is-reshaping-k12-email-protection/</loc>
		<lastmod>2025-06-02T13:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cracks-down-on-crypting-crew-in-a-global-counter-antivirus-service-disruption/</loc>
		<lastmod>2025-06-02T13:14:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acreed-emerges-as-dominant-infostealer-threat-following-lumma-takedown/</loc>
		<lastmod>2025-06-02T13:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-artificial-intelligence-phishing-detection-is-reshaping-k12-email-protection-2/</loc>
		<lastmod>2025-06-02T13:15:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-apt-intrusions-ai-malware-zero-click-exploits-browser-hijacks-and-more/</loc>
		<lastmod>2025-06-02T13:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-vietnamesische-hacker-faken-werbeanzeigen-um-daten-zu-stehlen/</loc>
		<lastmod>2025-06-02T13:22:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-ships-emergency-patch-to-fix-windows-11-startup-failures/</loc>
		<lastmod>2025-06-02T13:25:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hulucaptcha-fake-captcha-kit-tricks-users-into-executing-code-via-windows-run-command/</loc>
		<lastmod>2025-06-02T13:25:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-ships-emergency-patch-to-fix-windows-11-startup-failures-2/</loc>
		<lastmod>2025-06-02T13:26:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enhancing-kubernetes-security-with-ai-powered-intrusion-detection/</loc>
		<lastmod>2025-06-02T14:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ninjatech-and-aws-unveil-next-gen-ai-assistant-for-productivity/</loc>
		<lastmod>2025-06-02T14:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-invests-400-million-in-switzerland-for-ai-and-cloud/</loc>
		<lastmod>2025-06-02T14:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-open-sources-github-copilot-a-new-era-for-ai-coding/</loc>
		<lastmod>2025-06-02T14:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-tools-and-initiatives-in-data-breach-monitoring-and-healthcare-ai/</loc>
		<lastmod>2025-06-02T14:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-ai-search-introduces-agentic-retrieval-for-enhanced-relevance/</loc>
		<lastmod>2025-06-02T14:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/may-recap-new-aws-services-and-privileged-permissions/</loc>
		<lastmod>2025-06-02T14:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-2-0-in-practice-building-an-oauth-client/</loc>
		<lastmod>2025-06-02T14:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invasion-of-privacy-the-hidden-camera-dilemma/</loc>
		<lastmod>2025-06-02T14:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-bande-erpresst-volkswagen/</loc>
		<lastmod>2025-06-02T14:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-drops-the-lowest-tier-of-its-partner-program-except-in-europe/</loc>
		<lastmod>2025-06-02T14:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wanted-it-manager-for-uk-government-agency-60k/</loc>
		<lastmod>2025-06-02T14:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-robbinhood-ransomware-operator-pleads-guilty-in-us-city-attacks/</loc>
		<lastmod>2025-06-02T14:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosecurity-2025-nca-cyber-intelligence-head-spells-out-trends/</loc>
		<lastmod>2025-06-02T14:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-mediatek-flaws-allow-hackers-to-gain-elevated-access-with-no-user-input/</loc>
		<lastmod>2025-06-02T14:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-ransomware-drill-to-spotlight-water-utility-cyber-risks-in-operation-999/</loc>
		<lastmod>2025-06-02T14:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/realtek-bluetooth-driver-flaw-allows-attackers-to-delete-any-file-on-windows-systems/</loc>
		<lastmod>2025-06-02T14:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-reveals-discovery-of-cyberattack-aimed-at-tool-to-build-ai-apps/</loc>
		<lastmod>2025-06-02T15:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-launches-ai-edge-gallery-app-for-local-ai-model-execution/</loc>
		<lastmod>2025-06-02T15:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/visual-studio-2022-v17-14-new-agent-mode-and-copilot-features/</loc>
		<lastmod>2025-06-02T15:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/java-25-launches-stable-values-api-for-enhanced-immutability/</loc>
		<lastmod>2025-06-02T15:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malaysian-home-ministers-whatsapp-hacked-used-to-scam-contacts/</loc>
		<lastmod>2025-06-02T15:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bka-enthullt-identitat-von-trickbot-anfuhrer/</loc>
		<lastmod>2025-06-02T15:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-the-ai-race-with-china-dont-forget-about-security/</loc>
		<lastmod>2025-06-02T15:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-datastage-bug-exposes-database-credentials-in-plain-tex/</loc>
		<lastmod>2025-06-02T15:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptojacking-campaign-targets-devops-servers-including-nomad/</loc>
		<lastmod>2025-06-02T15:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-und-sicherheitsbedenken-signal-messenger-sichert-nutzer-gegen-windows-recall-ab/</loc>
		<lastmod>2025-06-02T15:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-linux-vulnerabilities-risk-password-hash-theft-worldwide/</loc>
		<lastmod>2025-06-02T15:07:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-drones-ukraines-historic-strikes-on-russian-aircraft/</loc>
		<lastmod>2025-06-02T15:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-market-emerges-as-a-go-to-shop-for-stolen-credentials/</loc>
		<lastmod>2025-06-02T15:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-networks-veroffentlicht-praxisnahen-leitfaden-zur-besseren-eindammung-von-sicherheitsvorfallen/</loc>
		<lastmod>2025-06-02T15:07:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-analysis-links-service-disruption-to-software-flaw/</loc>
		<lastmod>2025-06-02T16:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/download-the-new-thinking-about-cloud-computing-enterprise-spotlight/</loc>
		<lastmod>2025-06-02T16:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-and-digital-get-over-1bn-to-enhance-uks-national-security/</loc>
		<lastmod>2025-06-02T16:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-philippines-funnull-technology-over-200m-crypto-scam/</loc>
		<lastmod>2025-06-02T16:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-perimeter-defense-making-attack-surface-management-a-business-enabler/</loc>
		<lastmod>2025-06-02T16:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preinstalled-android-apps-found-leaking-pins-and-executing-malicious-commands/</loc>
		<lastmod>2025-06-02T16:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-fixes-3-zero-days-used-in-targeted-android-attacks-via-adreno-gpu/</loc>
		<lastmod>2025-06-02T16:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-vulnerabilities-expose-password-hashes-via-core-dumps/</loc>
		<lastmod>2025-06-02T16:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophisticated-malware-campaign-targets-windows-and-linux-systems/</loc>
		<lastmod>2025-06-02T16:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cisa-budget-lays-out-deep-job-cuts-program-reductions/</loc>
		<lastmod>2025-06-02T16:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-ukraine-hacker-group-black-owl-poses-major-threat-to-russia-kaspersky-says/</loc>
		<lastmod>2025-06-02T16:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-took-down-several-popular-counter-antivirus-cav-services-including-avcheck/</loc>
		<lastmod>2025-06-02T16:08:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/launch-of-e92spark-extends-disties-options/</loc>
		<lastmod>2025-06-02T16:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monster-mitigates-malicious-traffic-fake-accounts-with-datadomes-ai-powered-protection/</loc>
		<lastmod>2025-06-02T17:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-budget-proposal-would-slash-more-than-1000-cisa-jobs/</loc>
		<lastmod>2025-06-02T17:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nso-group-asks-judge-for-new-trial-calling-167-million-in-damages-outrageous/</loc>
		<lastmod>2025-06-02T17:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-fixed-three-zero-days-exploited-in-limited-targeted-attacks/</loc>
		<lastmod>2025-06-02T17:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australia-begins-new-ransomware-payment-disclosure-rules/</loc>
		<lastmod>2025-06-02T17:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-bugs-could-spark-takeover-of-widely-used-fire-safety-ot-ics-platform/</loc>
		<lastmod>2025-06-02T17:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptojacking-campaign-exploits-devops-apis-using-offshelf-tools-from-github/</loc>
		<lastmod>2025-06-02T17:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preinstalled-apps-on-ulefone-krugermatz-phones-let-any-app-reset-device-steal-pin/</loc>
		<lastmod>2025-06-02T17:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-no-code-auf-ki-trifft-wie-smapone-mit-nova-die-digitalisierung-in-unternehmen-neu-denkt/</loc>
		<lastmod>2025-06-02T17:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-archaea/</loc>
		<lastmod>2025-06-02T18:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-hunting-for-overlooked-cookies-in-windows-11-ktm-and-baking-exploits-for-them/</loc>
		<lastmod>2025-06-02T18:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-operation-takes-down-crypting-sites-used-for-testing-malware/</loc>
		<lastmod>2025-06-02T18:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vanta-bug-exposed-customers-data-to-other-customers/</loc>
		<lastmod>2025-06-02T18:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-breached-connectwise-compromised-customer-screenconnect-instances/</loc>
		<lastmod>2025-06-02T18:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-to-distrust-chunghwa-telecom-netlock-certificates-in-august/</loc>
		<lastmod>2025-06-02T18:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-and-crowdstrike-partner-to-link-hacking-group-names/</loc>
		<lastmod>2025-06-02T18:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-surfaces-rise-on-cyberattacks-fueled-by-ai/</loc>
		<lastmod>2025-06-02T19:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-dutch-agencies-shut-down-avcheck-services-used-by-threat-groups/</loc>
		<lastmod>2025-06-02T19:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-security-alert-16-6-billion-in-cyber-losses-underscore-critical-need-for-advanced-security-training/</loc>
		<lastmod>2025-06-02T19:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breaking-the-lifecycle-of-stolen-credentials-before-it-breaks-you/</loc>
		<lastmod>2025-06-02T19:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nso-appeals-whatsapp-decision-says-it-cant-pay-168-million-in-unlawful-damages/</loc>
		<lastmod>2025-06-02T19:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-security-the-importance-of-vulnerability-assessment-and-penetration-testing-vapt/</loc>
		<lastmod>2025-06-02T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-crash-reporting-flaws-cve-2025-5054-4598-expose-password-hashes/</loc>
		<lastmod>2025-06-02T19:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/</loc>
		<lastmod>2025-06-02T19:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealth-syscall-technique-allows-hackers-to-evade-event-tracing-and-edr-detection/</loc>
		<lastmod>2025-06-02T19:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mainstreet-bank-reports-vendor-cyber-incident-that-leaked-customer-info/</loc>
		<lastmod>2025-06-02T20:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-keep-your-litecoin-safe-a-practical-guide/</loc>
		<lastmod>2025-06-02T20:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cfos-targeted-in-sophisticated-phishing-campaign-using-legit-netbird-tool/</loc>
		<lastmod>2025-06-02T20:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-leverage-clickfix-technique-to-deploy-eddiestealer-malware/</loc>
		<lastmod>2025-06-02T20:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trickbot-conti-ransomware-operator-unmasked-amid-huge-ops-leak/</loc>
		<lastmod>2025-06-02T20:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-changing-threat-landscape-drives-cybersecurity-spending-shifts/</loc>
		<lastmod>2025-06-02T20:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frequently-asked-questions-about-badsuccessor/</loc>
		<lastmod>2025-06-02T21:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/getting-the-most-value-out-of-the-oscp-after-the-exam/</loc>
		<lastmod>2025-06-02T21:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainians-smuggle-drones-hidden-in-cabins-on-trucks-to-strike-russian-airfields/</loc>
		<lastmod>2025-06-02T21:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-hyperconverged-infrastructure-can-address-cloud-and-edge-problems/</loc>
		<lastmod>2025-06-02T21:05:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-subject-requests-the-hidden-channel-opportunity/</loc>
		<lastmod>2025-06-02T21:05:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dartpoints-sets-stage-for-growth-in-underserved-markets-after-major-investment/</loc>
		<lastmod>2025-06-02T21:06:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-and-td-synnex-strengthen-mssp-play-across-latin-america/</loc>
		<lastmod>2025-06-02T21:06:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-powered-socs-can-boost-business-for-mssps/</loc>
		<lastmod>2025-06-02T21:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-and-microsoft-align-on-threat-actor-mapping-to-support-faster-unified-defense/</loc>
		<lastmod>2025-06-02T21:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-that-empowers-redefining-security-operations-excellence-with-ai-human-expertise/</loc>
		<lastmod>2025-06-02T21:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-contextualized-cisa-kev-catalog-pushed/</loc>
		<lastmod>2025-06-02T21:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-post-quantum-cryptography-migration-guidance-unveiled/</loc>
		<lastmod>2025-06-02T21:07:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-ddos-attack-disrupts-moscows-internet-services/</loc>
		<lastmod>2025-06-02T21:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/impersonation-of-white-house-chief-of-staff-under-federal-probe/</loc>
		<lastmod>2025-06-02T21:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-52-5m-settlement-to-be-paid-by-fred-hutch-over-2023-cyberattack/</loc>
		<lastmod>2025-06-02T21:07:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-safety-review-board-revival-sought-by-senators/</loc>
		<lastmod>2025-06-02T21:08:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/covenant-health-attack-impacts-maine-new-hampshire-hospitals/</loc>
		<lastmod>2025-06-02T21:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-tiktok-breach-claimed-to-compromise-428m-users/</loc>
		<lastmod>2025-06-02T21:08:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widespread-linux-password-hash-theft-likely-with-new-bugs/</loc>
		<lastmod>2025-06-02T21:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-exploiting-maximum-severity-vbulletin-vulnerability-ongoing/</loc>
		<lastmod>2025-06-02T21:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toll-of-latrodectus-malware-compromise-exceeds-44k-devices/</loc>
		<lastmod>2025-06-02T21:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/activity-of-haozi-phishing-service-surging-report-finds/</loc>
		<lastmod>2025-06-02T21:09:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-identity-why-saas-may-be-the-identity-risk-no-ones-talking-about/</loc>
		<lastmod>2025-06-02T21:09:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon2fa-leveraged-by-dadsec-to-pilfer-microsoft-365-credentials/</loc>
		<lastmod>2025-06-02T21:09:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-law-enforcement-effort-dismantles-malicious-antivirus-scanner/</loc>
		<lastmod>2025-06-02T21:09:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conti-trickbot-cybercrime-group-leader-unmasked/</loc>
		<lastmod>2025-06-02T21:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/broadcom-streamlines-reseller-program-to-strengthen-vmware-delivery/</loc>
		<lastmod>2025-06-02T21:10:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nwn-acquires-intervision-to-expand-ai-powered-it-services-and-cloud-capabilities/</loc>
		<lastmod>2025-06-02T21:10:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-automation-to-agency-the-next-leap-in-cyber-defense/</loc>
		<lastmod>2025-06-02T21:10:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mitre-outlines-roadmap-for-post-quantum-cryptography-migration/</loc>
		<lastmod>2025-06-02T21:10:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/igel-acquires-stratodesk-to-expand-secure-endpoint-offerings/</loc>
		<lastmod>2025-06-02T21:11:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/closing-the-gaps-vectra-ai-and-zscaler-team-up-to-see-what-sase-misses/</loc>
		<lastmod>2025-06-02T21:11:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nexg-forms-subsidiary-for-global-tech-partnerships/</loc>
		<lastmod>2025-06-02T21:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-it-ai-raise-security-concerns-in-south-africa/</loc>
		<lastmod>2025-06-02T21:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/norton-warns-of-sharp-rise-in-ai-powered-scams/</loc>
		<lastmod>2025-06-02T21:11:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cooper-health-breach-exposes-57000-patient-records/</loc>
		<lastmod>2025-06-02T21:12:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-push-identity-verification-to-the-fore/</loc>
		<lastmod>2025-06-02T21:12:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-you-cyber-resilient-five-traits-that-define-the-leaders-of-2025/</loc>
		<lastmod>2025-06-02T21:12:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-ways-to-make-cybersecurity-a-top-priority/</loc>
		<lastmod>2025-06-02T21:12:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-inside-hhs-budget-proposals-for-fy-2026/</loc>
		<lastmod>2025-06-02T22:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-fixes-three-adreno-gpu-flaws-abused-in-android-attacks/</loc>
		<lastmod>2025-06-02T22:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doges-nine-worst-cybersecurity-failures-under-elon-musk/</loc>
		<lastmod>2025-06-02T22:05:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lost-in-expectation-bedenkliche-rolle-der-dating-apps/</loc>
		<lastmod>2025-06-02T23:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euvd-peter-sandkuijl-wurdigt-european-union-vulnerability-database-als-schritt-zur-digitalen-widerstandsfahigkeit/</loc>
		<lastmod>2025-06-02T23:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frage-wie-steht-es-um-die-sicherheit-unserer-medizingerate-technik/</loc>
		<lastmod>2025-06-02T23:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vodafonethrees-a-crowd-now-comes-the-hard-bit/</loc>
		<lastmod>2025-06-02T23:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-homeland-security-budget-guts-cisa-staff-key-programs/</loc>
		<lastmod>2025-06-02T23:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-cisco-wireless-lan-controller-raises-exploit-fears/</loc>
		<lastmod>2025-06-02T23:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-minister-warns-of-heightened-chinese-espionage-threats/</loc>
		<lastmod>2025-06-02T23:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-buys-startup-fletch-to-automate-security-with-agentic-ai/</loc>
		<lastmod>2025-06-02T23:03:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cartier-discloses-data-breach-amid-fashion-brand-cyberattacks/</loc>
		<lastmod>2025-06-02T23:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-north-face-warns-customers-of-april-credential-stuffing-attack/</loc>
		<lastmod>2025-06-02T23:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emr-isac-shuts-down-what-happens-now/</loc>
		<lastmod>2025-06-02T23:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploitation-risk-grows-for-critical-cisco-bug/</loc>
		<lastmod>2025-06-02T23:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-fighting-cavities-securing-android-bluetooth-by-red-teaming/</loc>
		<lastmod>2025-06-03T00:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-the-broken-wall-why-the-security-perimeter-is-not-enough/</loc>
		<lastmod>2025-06-03T00:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-morpheus-ai-automates-the-entire-l1-l2-pipeline/</loc>
		<lastmod>2025-06-03T00:06:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-identity-crisis-at-the-heart-of-the-ai-agent-revolution/</loc>
		<lastmod>2025-06-03T04:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-identity-challenges-of-deploying-ai-agents-across-hybrid-environments/</loc>
		<lastmod>2025-06-03T04:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acds-continues-global-expansion-with-announcement-of-new-french-entity/</loc>
		<lastmod>2025-06-03T04:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-you-dont-know-about-saas-can-violate-hipaa-compliance/</loc>
		<lastmod>2025-06-03T05:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-you-using-the-right-itdr-security-solution-grip/</loc>
		<lastmod>2025-06-03T05:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaum-ein-unternehmen-ist-auf-den-data-act-vorbereitet/</loc>
		<lastmod>2025-06-03T05:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbefugter-zugriff-bei-einer-luxusmodemarke-aus-frankreich/</loc>
		<lastmod>2025-06-03T05:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-konto-des-innenministers-von-malaysia-gehackt/</loc>
		<lastmod>2025-06-03T05:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-verpackungshersteller-in-nordrhein-westfalen-deutschland/</loc>
		<lastmod>2025-06-03T05:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-die-webseite-einer-gemeinnutzigen-organisation-in-grosbritannien/</loc>
		<lastmod>2025-06-03T05:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-in-virginia-usa-von-cyberangriff-auf-einen-dienstleister-betroffen/</loc>
		<lastmod>2025-06-03T05:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/development-vs-security-the-friction-threatening-your-code/</loc>
		<lastmod>2025-06-03T05:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chrome-zero-day-actively-exploited-google-issues-emergency-out-of-band-patch/</loc>
		<lastmod>2025-06-03T05:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kunstliche-intelligenz-in-der-it-sicherheit-wie-partner-mit-ki-gestutzter-security-neu-und-zusatzgeschaft-generieren-konnen/</loc>
		<lastmod>2025-06-03T06:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vet-open-source-software-supply-chain-security-tool/</loc>
		<lastmod>2025-06-03T06:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bankers-associations-attack-on-cybersecurity-transparency/</loc>
		<lastmod>2025-06-03T06:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-verfugbar-forscher-veroffentlichten-poc-fur-kritische-fortinet-sicherheitslucke/</loc>
		<lastmod>2025-06-03T06:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-systems-capable-of-detecting-nhidr/</loc>
		<lastmod>2025-06-03T07:07:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ganzheitliche-prufung-statt-einzelmasnahmen-so-wird-compliance-vom-pflichtprogramm-zur-integrierten-strategie/</loc>
		<lastmod>2025-06-03T07:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-is-your-data-against-nhis-attacks/</loc>
		<lastmod>2025-06-03T07:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatplattformen-ein-kaufratgeber/</loc>
		<lastmod>2025-06-03T07:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-hpe-storeonce-flaws-allow-remote-code-execution-by-attackers/</loc>
		<lastmod>2025-06-03T07:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-global-collaboration-is-hitting-cybercriminals-where-it-hurts/</loc>
		<lastmod>2025-06-03T07:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/falschinformationen-im-netz-werden-nur-selten-erkannt/</loc>
		<lastmod>2025-06-03T08:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-gives-superpowers-to-bec-attackers/</loc>
		<lastmod>2025-06-03T08:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-der-security-geht-es-vor-allem-um-resilienz/</loc>
		<lastmod>2025-06-03T08:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-dameware-vulnerability-could-let-attackers-gain-elevated-privileges/</loc>
		<lastmod>2025-06-03T08:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notfallupdate-aktiv-ausgenutzte-chrome-lucke-gefahrdet-nutzer/</loc>
		<lastmod>2025-06-03T08:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-half-of-firms-suffer-two-supply-chain-incidents-in-past-year/</loc>
		<lastmod>2025-06-03T08:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantensicher-kein-problem-hpe-stattet-server-per-chip-mit-deutlich-hoherer-sicherheit-aus/</loc>
		<lastmod>2025-06-03T08:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptojacking-campaign-relies-on-devops-tools/</loc>
		<lastmod>2025-06-03T09:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-are-impersonating-interactive-brokers-heres-what-you-need-to-know/</loc>
		<lastmod>2025-06-03T09:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lucken-im-gpu-treiber-endgerate-mit-qualcomm-chips-werden-attackiert/</loc>
		<lastmod>2025-06-03T09:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-to-distrust-two-certificate-authorities-over-compliance-and-conduct-issues/</loc>
		<lastmod>2025-06-03T09:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-and-crowdstrike-launch-shared-threat-actor-glossary-to-cut-attribution-confusion/</loc>
		<lastmod>2025-06-03T09:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-high-risk-vulnerabilities-in-microsoft-products/</loc>
		<lastmod>2025-06-03T10:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gesteuerte-scams-definieren-die-cyberkriminalitat-neu-2/</loc>
		<lastmod>2025-06-03T10:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitmex-turns-tables-on-lazarus-group-infiltrates-hacker-infrastructure/</loc>
		<lastmod>2025-06-03T10:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixed-the-second-actively-exploited-chrome-zero-day-since-the-start-of-the-year/</loc>
		<lastmod>2025-06-03T10:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-exploit-ethereum-wallets-with-obfuscated-javascript/</loc>
		<lastmod>2025-06-03T10:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-modsecurity-waf-vulnerability-enables-attackers-to-crash-systems/</loc>
		<lastmod>2025-06-03T10:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lyrix-ransomware-targets-windows-users-with-advanced-evasion-techniques/</loc>
		<lastmod>2025-06-03T10:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-target-perimeterx-captcha-to-automate-microsoft-account-creation/</loc>
		<lastmod>2025-06-03T10:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-trojan-crocodilus-now-active-in-8-countries-targeting-banks-and-crypto-wallets/</loc>
		<lastmod>2025-06-03T10:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-openvpn-client-vpn-server-mit-dem-synology-nas-aufbauen/</loc>
		<lastmod>2025-06-03T10:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktiv-ausgenutzt-lucken-in-qualcomm-treibern-gefahrden-unzahlige-smartphones/</loc>
		<lastmod>2025-06-03T10:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-high-cost-of-misconfigured-devops-global-cryptojacking-hits-enterprises/</loc>
		<lastmod>2025-06-03T11:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-fbi-cyber-official-cynthia-kaiser-exits-for-halcyon/</loc>
		<lastmod>2025-06-03T11:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bling-slinger-cartier-tells-customers-to-be-wary-of-phishing-attacks-after-intrusion/</loc>
		<lastmod>2025-06-03T11:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-new-chrome-zero-day-bug-exploited-in-attacks/</loc>
		<lastmod>2025-06-03T11:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-crocodilus-adds-fake-contacts-to-spoof-trusted-callers/</loc>
		<lastmod>2025-06-03T11:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-devops-web-server-misconfigurations-to-deploy-malware/</loc>
		<lastmod>2025-06-03T11:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/splunk-universal-forwarder-for-windows-flaw-grants-non-admin-users-full-content-access/</loc>
		<lastmod>2025-06-03T11:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-fake-booking-com-sites-spread-asyncrat-malware-to-infect-devices/</loc>
		<lastmod>2025-06-03T11:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unabhangigkeit-zwischen-anspruch-und-realitat-digitale-souveranitat-keine-ideologische-frage-sondern-strategische-entscheidung/</loc>
		<lastmod>2025-06-03T11:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-integriert-ndr-funktion-direkt-in-die-firewall/</loc>
		<lastmod>2025-06-03T11:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-imitationen-werden-zunehmend-eine-wachsende-gefahr-fur-unternehmen/</loc>
		<lastmod>2025-06-03T11:06:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/splunk-enterprise-xss-flaw-enables-attackers-to-execute-unauthorized-javascript/</loc>
		<lastmod>2025-06-03T11:06:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-vec-attacks-alarmingly-effective-at-driving-engagement/</loc>
		<lastmod>2025-06-03T11:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/future-ready-cybersecurity-lessons-from-the-mitre-cve-crisis/</loc>
		<lastmod>2025-06-03T12:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bevor-es-knallt-wie-data-breach-containment-angriffe-stoppt-bevor-sie-eskalieren/</loc>
		<lastmod>2025-06-03T12:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illicit-crypto-miners-pouncing-on-lazy-devops-configs-that-leave-clouds-vulnerable/</loc>
		<lastmod>2025-06-03T12:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nutzen-falsch-konfiguriertes-ki-tool-um-ki-generierte-payloads-auszufuhren/</loc>
		<lastmod>2025-06-03T12:03:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-uncovers-strengths-and-vulnerabilities-in-cloud-based-llm-guardrails/</loc>
		<lastmod>2025-06-03T12:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/photos-infosecurity-europe-2025/</loc>
		<lastmod>2025-06-03T12:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/per-coredump-angreifer-konnen-unter-linux-passwort-hashes-abgreifen/</loc>
		<lastmod>2025-06-03T12:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-ai-tool-misconfigurations-to-execute-malicious-ai-generated-payloads/</loc>
		<lastmod>2025-06-03T12:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-understanding-help-desk-scams-and-how-to-defend-your-organization/</loc>
		<lastmod>2025-06-03T12:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-wird-die-finanz-it-resilient-dora-sicher-implementieren/</loc>
		<lastmod>2025-06-03T12:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/network-detection-and-response-integriert-in-der-firewall/</loc>
		<lastmod>2025-06-03T12:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-h-world-hotelgruppe-steigenberger-co/</loc>
		<lastmod>2025-06-03T12:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cartier-datenleck-was-betroffene-jetzt-tun-konnen/</loc>
		<lastmod>2025-06-03T13:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/</loc>
		<lastmod>2025-06-03T13:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-awareness-trainings-dringender-bedarf-angesichts-zunehmender-cyberbedrohungen-in-europa-insbesondere-phishing/</loc>
		<lastmod>2025-06-03T13:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blick-auf-die-pro-russischen-cyber-aktivitaten-und-den-verstarkten-fokus-der-nato-auf-cyberresilienz/</loc>
		<lastmod>2025-06-03T13:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/84-prozent-aller-schwerwiegenden-cyberattacken-verwenden-livingthe-land-taktiken/</loc>
		<lastmod>2025-06-03T13:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vertiv-erweitert-liquid-cooling-portfolio-mit-skalierbaren-cdu-losungen-fur-ki-und-hpc-rechenzentren/</loc>
		<lastmod>2025-06-03T13:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stefan-joost-ist-neuer-channel-manager-dach-eastern-europe-bei-claroty/</loc>
		<lastmod>2025-06-03T13:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-targets-over-2000-extremist-links-exploiting-minors-online/</loc>
		<lastmod>2025-06-03T13:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sailpoint-charts-course-for-ai-driven-identity-security/</loc>
		<lastmod>2025-06-03T13:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cyber-agency-cisa-faces-stiff-budget-cuts/</loc>
		<lastmod>2025-06-03T13:05:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-open-source-password-managers-for-windows-in-2025/</loc>
		<lastmod>2025-06-03T13:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-safari-xss-vulnerability-exploits-javascript-error-handling-to-run-arbitrary-code/</loc>
		<lastmod>2025-06-03T13:06:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-report-governments-struggle-to-regain-backdoor-access-to-secure-communications/</loc>
		<lastmod>2025-06-03T13:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-weight-chinese-ai-models-drive-privacy-innovation-in-llms/</loc>
		<lastmod>2025-06-03T13:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dreistufiger-sicherheitsansatz-bsi-fordert-hohere-cybersicherheit-fur-den-energiesektor/</loc>
		<lastmod>2025-06-03T13:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-missbrauchen-fehlkonfiguriertes-ki-tool-zur-ausfuhrung-von-schadlichem-code/</loc>
		<lastmod>2025-06-03T13:07:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualys-tru-entdeckt-lokale-sicherheitslucken-in-apport-und-systemd-coredump/</loc>
		<lastmod>2025-06-03T13:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aembit-extends-workload-iam-to-microsoft-ecosystem-securing-hybrid-access-for-non-human-identities/</loc>
		<lastmod>2025-06-03T14:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-hacker-many-names-industry-collaboration-aims-to-fix-cyber-threat-label-chaos/</loc>
		<lastmod>2025-06-03T14:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-wireless-lan-controllers-under-threat-again-after-critical-exploit-details-go-public/</loc>
		<lastmod>2025-06-03T14:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-unveils-ai-and-security-updates-five-things-to-know/</loc>
		<lastmod>2025-06-03T14:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-giant-kettering-still-facing-disruption-weeks-after-ransomware-attack/</loc>
		<lastmod>2025-06-03T14:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-identitatsbetrug-auf-instagram-die-sicherheit-von-unternehmen-bedroht/</loc>
		<lastmod>2025-06-03T14:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualys-entdeckt-zwei-lokale-sicherheitslucken-in-apport-und-systemd-coredump-in-linux-systemen/</loc>
		<lastmod>2025-06-03T14:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-the-patch-that-put-windows-11-in-a-coma/</loc>
		<lastmod>2025-06-03T14:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aembit-extends-workload-iam-to-microsoft-ecosystem-securing-hybrid-access-for-non-human-identities-2/</loc>
		<lastmod>2025-06-03T14:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silence-security-speed-this-antivirus-checks-every-box/</loc>
		<lastmod>2025-06-03T14:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-delays-earnings-release-after-security-incident/</loc>
		<lastmod>2025-06-03T14:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-on-connectwise-screenconnect-authentication-vulnerability-actively-exploited/</loc>
		<lastmod>2025-06-03T14:05:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-ios-activation-flaw-enables-injection-of-unauthenticated-xml-payloads/</loc>
		<lastmod>2025-06-03T14:05:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-demand-more-of-your-vendors-to-ease-quantum-transition-say-experts/</loc>
		<lastmod>2025-06-03T14:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-docusign-pages-deliver-multi-stage-netsupport-rat-malware/</loc>
		<lastmod>2025-06-03T14:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-and-the-kettering-ransomware-attack-clickfixs-persistence/</loc>
		<lastmod>2025-06-03T15:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conquering-complexity-and-risk-with-data-security-posture-insights/</loc>
		<lastmod>2025-06-03T15:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-2024-polizei-schlagt-zuruck-doch-die-bedrohung-bleibt-hoch/</loc>
		<lastmod>2025-06-03T15:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-aembit-brings-workload-iam-to-microsoft-stack-secures-hybrid-ai-and-app-access/</loc>
		<lastmod>2025-06-03T15:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-seeking-to-boost-partner-services-with-red-canary-deal-ceo/</loc>
		<lastmod>2025-06-03T15:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-high-cost-of-misconfigured-devops-tools-global-cryptojacking-hits-enterprises/</loc>
		<lastmod>2025-06-03T15:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/steuer-phishing-zur-abgabefrist/</loc>
		<lastmod>2025-06-03T15:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-banking-trojan-crocodilus-rapidly-evolves-and-goes-global/</loc>
		<lastmod>2025-06-03T15:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-launches-new-system-to-detect-firefox-crypto-drainer-add-ons/</loc>
		<lastmod>2025-06-03T15:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-three-things-the-news-doesnt-tell-you/</loc>
		<lastmod>2025-06-03T15:05:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-connectwise-screenconnect-bug-exploited-in-attacks/</loc>
		<lastmod>2025-06-03T15:06:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-russian-dark-web-market-tools-drive-surge-in-credential-theft-attacks/</loc>
		<lastmod>2025-06-03T15:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-sponsored-groups-intensify-attacks-on-manufacturing-sector-and-ot-systems/</loc>
		<lastmod>2025-06-03T15:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-security-update-addresses-high-severity-privilege-escalation-flaws/</loc>
		<lastmod>2025-06-03T15:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aembit-extends-workload-iam-to-microsoft-ecosystem-securing-hybrid-access-for-non-human-identities-3/</loc>
		<lastmod>2025-06-03T15:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-face-fashion-brand-alerts-customers-to-credential-stuffing-attack/</loc>
		<lastmod>2025-06-03T15:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-10-year-old-roundcube-webmail-bug-allows-authenticated-users-run-malicious-code/</loc>
		<lastmod>2025-06-03T15:09:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-face-fashion-brand-alerts-customers-to-credential-stuffing-attack-2/</loc>
		<lastmod>2025-06-03T15:09:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-good-cybersecurity-enabled-ukraines-surprise-attack-on-russia-says-ncsc/</loc>
		<lastmod>2025-06-03T15:10:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-10-year-old-roundcube-webmail-bug-allows-authenticated-users-run-malicious-code-2/</loc>
		<lastmod>2025-06-03T15:10:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-good-cybersecurity-enabled-ukraines-surprise-attack-on-russia-says-ncsc-2/</loc>
		<lastmod>2025-06-03T15:10:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-budget-plan-to-cut-nearly-1000-jobs-at-cyber-agency-cisa/</loc>
		<lastmod>2025-06-03T15:10:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-budget-plan-to-cut-nearly-1000-jobs-at-cyber-agency-cisa-2/</loc>
		<lastmod>2025-06-03T15:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-calm-before-the-storm-first-party-fraud-ist-weltweit-fuhrende-betrugsform/</loc>
		<lastmod>2025-06-03T15:10:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-calm-before-the-storm-first-party-fraud-ist-weltweit-fuhrende-betrugsform-2/</loc>
		<lastmod>2025-06-03T15:10:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erhohte-phishing-angriffe-zur-steuersaison/</loc>
		<lastmod>2025-06-03T15:10:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/growth-hacking-2-0-from-traditional-seo-to-ai-powered-answer-engine-optimization/</loc>
		<lastmod>2025-06-03T16:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-comprehensive-workload-identity-and-access-management-across-microsoft-environments/</loc>
		<lastmod>2025-06-03T16:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/posture-a%e2%80%b0-protection/</loc>
		<lastmod>2025-06-03T16:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-postponing-release-of-report-earnings-amid-breach-impact/</loc>
		<lastmod>2025-06-03T16:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crocodilus-malware-adds-fake-entries-to-victims-contact-lists-in-new-scam-campaign/</loc>
		<lastmod>2025-06-03T16:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-pleads-guilty-to-swatting-spree-impacting-scores-of-government-officials/</loc>
		<lastmod>2025-06-03T16:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-exposure-of-azure-ad-data-via-unauthenticated-microsoft-graphapi-token/</loc>
		<lastmod>2025-06-03T16:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacks-hit-top-retailers-cartier-north-face-among-latest-victims/</loc>
		<lastmod>2025-06-03T16:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-appeals-dma-says-eu-has-deeply-flawed-rules-that-stifle-innovation/</loc>
		<lastmod>2025-06-03T16:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-pumabot-targets-iot-devices-with-ssh-credential-brute-force-attack/</loc>
		<lastmod>2025-06-03T16:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacker-black-owl-targets-critical-industries-to-steal-financial-data/</loc>
		<lastmod>2025-06-03T16:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-reveal-container-based-attacks-through-host-based-log-analysis/</loc>
		<lastmod>2025-06-03T16:04:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-ciso-navigating-your-flight-path/</loc>
		<lastmod>2025-06-03T16:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-docusign-gitcode-sites-spread-netsupport-rat-via-multi-stage-powershell-attack/</loc>
		<lastmod>2025-06-03T16:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-channel-bridges-security-skills-gap/</loc>
		<lastmod>2025-06-03T16:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elon-musk-kundigt-an-xchat-soll-bitcoin-ahnliche-verschlusselung-bieten/</loc>
		<lastmod>2025-06-03T16:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-crowdstrike-partner-to-bring-clarity-to-threat-actor-identities/</loc>
		<lastmod>2025-06-03T17:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-tackling-the-saas-security-problem-means-to-me/</loc>
		<lastmod>2025-06-03T17:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hypr-and-hid-converge-physical-and-digital-access-control/</loc>
		<lastmod>2025-06-03T17:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-router-hijackings-highlight-urgent-need-for-advanced-threat-detection-and-response/</loc>
		<lastmod>2025-06-03T17:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-nominees-gain-broad-industry-support/</loc>
		<lastmod>2025-06-03T17:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-microsoft-aim-to-eliminate-confusion-in-threat-group-attribution/</loc>
		<lastmod>2025-06-03T17:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-endorse-sean-cairncross-for-national-cyber-director-ahead-of-senate-hearing/</loc>
		<lastmod>2025-06-03T17:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-grocery-startup-kiranapro-was-hacked-and-its-servers-deleted-ceo-confirms/</loc>
		<lastmod>2025-06-03T17:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-continuous-integration-and-continuous-deployment-ci-cd-in-devops/</loc>
		<lastmod>2025-06-03T17:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-farm-industry-spied-on-animal-rights-activists-and-pushed-the-fbi-to-treat-them-as-bioterrorists/</loc>
		<lastmod>2025-06-03T17:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-adds-quick-machine-recovery-to-windows-11-settings/</loc>
		<lastmod>2025-06-03T17:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-rubygems-pose-as-fastlane-to-steal-telegram-api-data/</loc>
		<lastmod>2025-06-03T17:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umgehung-des-sandboxings-meta-und-yandex-de-anonymisieren-android-nutzer/</loc>
		<lastmod>2025-06-03T17:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crooks-fleece-the-north-face-accounts-with-recycled-logins/</loc>
		<lastmod>2025-06-03T18:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-bug-at-compliance-firm-vanta-leaks-customer-data-to-other-clients/</loc>
		<lastmod>2025-06-03T18:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coinbase-breach-tied-to-bribed-taskus-support-agents-in-india/</loc>
		<lastmod>2025-06-03T18:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-chainspotting-2-the-unofficial-sequel-to-the-2018-talk-chainspotting/</loc>
		<lastmod>2025-06-03T19:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-practical-moves-to-take-control-of-cybersecurity-exposure/</loc>
		<lastmod>2025-06-03T19:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-does-it-mean-to-be-a-true-mssp/</loc>
		<lastmod>2025-06-03T19:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-screenconnect-vulnerability-exploited-cisa/</loc>
		<lastmod>2025-06-03T19:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xs-new-encrypted-xchat-feature-seems-no-more-secure-than-the-failure-that-came-before-it/</loc>
		<lastmod>2025-06-03T19:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lummac2-fractures-as-acreed-malware-becomes-top-dog/</loc>
		<lastmod>2025-06-03T19:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-datadome-protected-a-global-fintech-platform-from-a-week-long-credential-stuffing-attack/</loc>
		<lastmod>2025-06-03T20:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-hands-vodafone-51-million-fine-over-data-privacy-violations/</loc>
		<lastmod>2025-06-03T20:06:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-addresses-34-high-severity-vulnerabilities-in-junes-android-security-update/</loc>
		<lastmod>2025-06-03T20:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phone-chipmaker-qualcomm-fixes-three-zero-days-exploited-by-hackers/</loc>
		<lastmod>2025-06-03T20:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-quietly-pushes-emergency-fix-for-chrome-0-day-as-exploit-runs-wild/</loc>
		<lastmod>2025-06-03T20:06:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cartier-north-face-mainstreet-bank-among-retailers-struck-by-cyberattacks/</loc>
		<lastmod>2025-06-03T20:07:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaseyas-new-ceo-rania-succar-takes-the-reins-with-goal-of-driving-msp-success/</loc>
		<lastmod>2025-06-03T20:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cork-rewst-partnership-delivers-automated-vulnerability-management-for-msps/</loc>
		<lastmod>2025-06-03T20:07:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/socradar-empowers-mssps-with-free-ai-agent-training-and-multi-tenant-automation-support/</loc>
		<lastmod>2025-06-03T20:07:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-compass-adds-devici-to-strengthen-threat-modeling-in-secure-software-design/</loc>
		<lastmod>2025-06-03T20:07:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-hyperscaler-for-cybersecurity-2/</loc>
		<lastmod>2025-06-03T20:08:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-introduces-instant-api-security-deployment-with-complete-environment-visibility/</loc>
		<lastmod>2025-06-03T20:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dataguard-partners-with-qbs-software-to-expand-security-and-compliance-access-across-europe/</loc>
		<lastmod>2025-06-03T20:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-is-the-new-deterrence-why-congress-must-act-before-the-next-escalation/</loc>
		<lastmod>2025-06-03T20:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snowflake-launches-gen2-compute-adaptive-warehouses-and-ai-governance-to-streamline-data-management/</loc>
		<lastmod>2025-06-03T20:08:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/general-informatics-expands-cybersecurity-and-maritime-reach-with-globenet-acquisition/</loc>
		<lastmod>2025-06-03T20:10:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illumio-nvidia-integration-offers-mssps-new-tools-for-zero-trust-in-critical-infrastructure/</loc>
		<lastmod>2025-06-03T20:10:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-cisa-cuts-detailed-in-new-budget-proposal/</loc>
		<lastmod>2025-06-03T20:10:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nso-appeals-payment-of-167m-in-damages-to-whatsapp/</loc>
		<lastmod>2025-06-03T20:10:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/barracudaone-launches-to-address-security-tool-sprawl/</loc>
		<lastmod>2025-06-03T20:10:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-volkswagen-breach-unsubstantiated/</loc>
		<lastmod>2025-06-03T20:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-hours-long-outage-due-to-software-bug/</loc>
		<lastmod>2025-06-03T20:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credential-stuffing-attack-impacts-the-north-face-client-data/</loc>
		<lastmod>2025-06-03T20:11:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-compromise-confirmed-by-cartier/</loc>
		<lastmod>2025-06-03T20:11:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mainstreet-bank-data-pilfered-in-third-party-hack/</loc>
		<lastmod>2025-06-03T20:11:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-leaks-vanta-customer-info/</loc>
		<lastmod>2025-06-03T20:14:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-coinbase-breach-reportedly-due-to-customer-data-exposure-overseas/</loc>
		<lastmod>2025-06-03T20:14:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acreed-becomes-leading-infostealing-malware-report-finds/</loc>
		<lastmod>2025-06-03T20:14:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/actively-exploited-google-chrome-zero-day-addressed/</loc>
		<lastmod>2025-06-03T20:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/misconfigured-open-webui-leveraged-for-ai-based-payload-delivery/</loc>
		<lastmod>2025-06-03T20:14:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-packages-aim-to-backdoor-windows-linux-systems/</loc>
		<lastmod>2025-06-03T20:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-military-hacking-unit-uncovered/</loc>
		<lastmod>2025-06-03T20:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-owl-hacktivist-group-significantly-imperils-russia/</loc>
		<lastmod>2025-06-03T20:15:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zest-security-and-upwind-partner-to-close-the-gap-between-cloud-threat-detection-and-action/</loc>
		<lastmod>2025-06-03T20:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evo-security-unveils-ai-powered-end-user-elevation-tool-for-msps/</loc>
		<lastmod>2025-06-03T20:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-identity-security-crisis-looms-in-the-age-of-agentic-ai/</loc>
		<lastmod>2025-06-03T20:16:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-crowdstrike-look-to-harmonize-threat-actor-terminology/</loc>
		<lastmod>2025-06-03T20:16:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-hashicorp-gitea-servers-targeted-in-cryptojacking-campaign/</loc>
		<lastmod>2025-06-03T20:16:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-ios-xe-bug-rated-10-0-waiting-is-not-an-option-pros-say/</loc>
		<lastmod>2025-06-03T20:16:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-an-uncertain-2025-msps-should-expand-their-it-security-services-analyst/</loc>
		<lastmod>2025-06-03T20:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-2026-budget-guts-cisa-nearly-30-of-jobs-and-500m-on-the-chopping-block/</loc>
		<lastmod>2025-06-03T20:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacks-are-up-47-in-2025-ai-is-one-key-factor/</loc>
		<lastmod>2025-06-03T20:17:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-drops-trust-for-chunghwa-netlock-certificates/</loc>
		<lastmod>2025-06-03T20:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-growing-chaos-of-ai-agents-why-your-identity-architecture-is-headed-for-trouble/</loc>
		<lastmod>2025-06-03T21:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-third-zero-day-flaw-in-chrome-this-year/</loc>
		<lastmod>2025-06-03T21:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-asus-rt-ax55-devices-craft-cms-and-connectwise-screenconnect-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-06-03T21:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorias-secret-delays-earnings-call-due-to-cyber-incident/</loc>
		<lastmod>2025-06-03T21:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-under-siege/</loc>
		<lastmod>2025-06-03T22:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/upgrading-splunk-universal-forwarders-from-the-deployment-server/</loc>
		<lastmod>2025-06-03T22:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-meta-and-yandex-broke-android-privacy/</loc>
		<lastmod>2025-06-03T22:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-rolls-out-memory-upgrade-for-free-users/</loc>
		<lastmod>2025-06-03T22:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hewlett-packard-enterprise-warns-of-critical-storeonce-auth-bypass/</loc>
		<lastmod>2025-06-03T22:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-frame-by-frame-kernel-streaming-keeps-giving-vulnerabilities/</loc>
		<lastmod>2025-06-03T22:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-cars-dumb-passwords-auto-industry-still-runs-on-weak-passwords/</loc>
		<lastmod>2025-06-03T22:08:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-is-hopeful-gpt-5-will-compete-a-little-more/</loc>
		<lastmod>2025-06-03T22:08:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crocodilus-sharpens-its-teeth-on-android-users/</loc>
		<lastmod>2025-06-03T22:08:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundesdatenschutzbeauftragte-verhangte-geldbusen-gegen-vodafone/</loc>
		<lastmod>2025-06-03T23:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-plain-text-editor-gets-fancy-as-notepad-gains-formatting-options/</loc>
		<lastmod>2025-06-03T23:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-networks-lands-55m-series-c-to-drive-zero-trust-growth/</loc>
		<lastmod>2025-06-03T23:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutzvorfall-bei-unterwegs-outdoor-shop-gmbh-mai-2025/</loc>
		<lastmod>2025-06-03T23:05:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-scam-losses-increase-28-in-2025/</loc>
		<lastmod>2025-06-03T23:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lumma-stealer-malware-resurgence-challenges-global-takedown/</loc>
		<lastmod>2025-06-03T23:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugsblindheit-europaischer-unternehmen-trotz-angriffszunahme-um-59-prozent-waltet-zuversicht/</loc>
		<lastmod>2025-06-04T00:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-pauses-mobile-port-tracking-tech-on-android-after-researchers-cry-foul/</loc>
		<lastmod>2025-06-04T00:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-6-identity-problems-blocking-ai-agent-adoption-in-hybrid-environments/</loc>
		<lastmod>2025-06-04T04:04:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-investment-in-iam-justified/</loc>
		<lastmod>2025-06-04T04:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adapting-to-the-changing-landscape-of-nhis-safety/</loc>
		<lastmod>2025-06-04T04:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/choosing-the-right-strategy-for-secrets-sprawl/</loc>
		<lastmod>2025-06-04T04:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discover-first-defend-fully-the-essential-first-step-on-your-api-security-journey/</loc>
		<lastmod>2025-06-04T04:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unleashing-efficiency-top-benefits-of-data-center-tracking-software/</loc>
		<lastmod>2025-06-04T04:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-are-we-super-fked-by-agentic-ai-or-finally-able-to-take-charge-of-what-comes-next/</loc>
		<lastmod>2025-06-04T04:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funf-gefahren-des-ubermasigen-teilens-von-personlichen-informationen-in-sozialen-medien/</loc>
		<lastmod>2025-06-04T04:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-the-news-managedmethods-helps-k-12-schools-with-launch-of-advanced-phishing-ai-solution/</loc>
		<lastmod>2025-06-04T05:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-weg-zur-resilienz-uberleben-und-weiterentwickeln/</loc>
		<lastmod>2025-06-04T05:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deliberate-attack-deletes-shopping-apps-aws-and-github-resources/</loc>
		<lastmod>2025-06-04T05:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-governance-in-a-decentralized-identity-world/</loc>
		<lastmod>2025-06-04T05:03:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-need-better-tools-to-turn-risk-into-action/</loc>
		<lastmod>2025-06-04T05:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatbook-selected-in-the-first-ever-gartner-magic-quadrant-for-network-detection-and-response-ndr/</loc>
		<lastmod>2025-06-04T06:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/improving-cost-efficiency-with-karpenter-1-0-an-upgrade-guide/</loc>
		<lastmod>2025-06-04T06:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/livingthe-land-taktiken-wenn-legitime-software-zur-waffe-wird/</loc>
		<lastmod>2025-06-04T06:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iso-27001-die-funf-grosten-missverstandnisse-uber-das-wichtigste-instrument-der-informationssicherheit/</loc>
		<lastmod>2025-06-04T06:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-risks-of-llm-autonomy/</loc>
		<lastmod>2025-06-04T06:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-and-the-risks-of-unpredictable-autonomy/</loc>
		<lastmod>2025-06-04T06:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/photos-infosecurity-europe-2025-part-2/</loc>
		<lastmod>2025-06-04T06:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-35-training-pack-may-help-you-land-a-cybersecurity-job/</loc>
		<lastmod>2025-06-04T06:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-issues-security-patch-for-storeonce-bug-allowing-remote-authentication-bypass/</loc>
		<lastmod>2025-06-04T06:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-manage-your-cyber-risk-in-a-modern-attack-surface/</loc>
		<lastmod>2025-06-04T07:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dollyway-world-domination-attack-compromises-20000-sites/</loc>
		<lastmod>2025-06-04T07:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwischen-sicherheit-und-wettbewerbsvorteil-der-eu-cyber-resilience-act-und-seine-auswirkungen/</loc>
		<lastmod>2025-06-04T07:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bevor-es-knallt-wie-datacontainment-angriffe-stoppt-bevor-sie-eskalieren/</loc>
		<lastmod>2025-06-04T08:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/custom-active-directory-extensions-create-stealthy-backdoors-for-corporate-attacks/</loc>
		<lastmod>2025-06-04T08:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-do-if-your-email-account-is-stolen-and-how-to-stop-it-happening-again/</loc>
		<lastmod>2025-06-04T08:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/optimierter-backupschutz-neue-funktionen-in-blocky-for-veeam/</loc>
		<lastmod>2025-06-04T08:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stay-ahead-of-identity-threats-with-grip-itdr-2-0-grip/</loc>
		<lastmod>2025-06-04T08:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mecklenburg-vorpommern-hackerangriff-trifft-diensthandys-der-polizei/</loc>
		<lastmod>2025-06-04T08:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatbook-selected-in-the-first-ever-gartner-magic-quadrant-for-network-detection-and-response-ndr-2/</loc>
		<lastmod>2025-06-04T08:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-schleusen-ki-malware-uber-open-webui-ein/</loc>
		<lastmod>2025-06-04T09:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dobrindt-will-aufrusten-gegen-cyberkriminelle/</loc>
		<lastmod>2025-06-04T09:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-ways-cisos-can-leverage-data-and-ai-to-better-secure-the-enterprise/</loc>
		<lastmod>2025-06-04T09:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cartier-disclosed-a-data-breach-following-a-cyber-attack/</loc>
		<lastmod>2025-06-04T09:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-abuse-prove-you-are-human-system-to-distribute-malware/</loc>
		<lastmod>2025-06-04T09:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-for-endpoint-prevents-cyberattacksecures-180000-devices/</loc>
		<lastmod>2025-06-04T09:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-ruby-gems-to-steal-telegram-tokens-and-messages/</loc>
		<lastmod>2025-06-04T09:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-startups-focus-on-visibility-and-governance-not-ai/</loc>
		<lastmod>2025-06-04T09:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-majority-of-compromises-caused-by-stolen-credentials-no-mfa/</loc>
		<lastmod>2025-06-04T09:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenleck-bei-unterwegs-groser-outdoor-shop-bestatigt-cyberangriff/</loc>
		<lastmod>2025-06-04T09:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emergency-chrome-update-to-fix-actively-exploited-cve-2025-5419/</loc>
		<lastmod>2025-06-04T10:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vermittlung-von-digitalkompetenz-in-knapp-drei-vierteln-der-unternehmen/</loc>
		<lastmod>2025-06-04T10:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-cyberem-command-to-spearhead-new-era-of-armed-conflict/</loc>
		<lastmod>2025-06-04T10:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stormwall-reveals-india-china-and-us-faced-most-ddos-attacks-in-q1-2025/</loc>
		<lastmod>2025-06-04T10:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-bribes-overseas-support-agents-to-steal-coinbase-customer-data/</loc>
		<lastmod>2025-06-04T10:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantensichere-kryptografie-masnahmen-gegen-harvest-now-decrypt-later-attacken/</loc>
		<lastmod>2025-06-04T10:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zolltarif-chaos-sorgt-fur-starken-aufwind-bei-der-zoll-scam-betrugsmasche/</loc>
		<lastmod>2025-06-04T10:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecuritys-rare-earth-skills-scarce-high-value-and-critical-for-future-defense/</loc>
		<lastmod>2025-06-04T10:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-multiple-qualcomm-chipsets-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-06-04T11:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-race-to-build-trumps-golden-dome-missile-defense-system-is-on/</loc>
		<lastmod>2025-06-04T11:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/youre-not-ready/</loc>
		<lastmod>2025-06-04T11:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-vibe-hacking-is-the-next-ai-nightmare/</loc>
		<lastmod>2025-06-04T11:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-gps-blackout-would-shut-down-the-world/</loc>
		<lastmod>2025-06-04T11:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/youre-not-ready-for-quantum-cracks/</loc>
		<lastmod>2025-06-04T11:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-texting-network-for-the-end-of-the-world/</loc>
		<lastmod>2025-06-04T11:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-grid-attack-looming-on-the-horizon/</loc>
		<lastmod>2025-06-04T11:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfake-scams-are-distorting-reality-itself/</loc>
		<lastmod>2025-06-04T11:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-qradar-vulnerabilities-expose-sensitive-configuration-files-to-attackers/</loc>
		<lastmod>2025-06-04T11:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wireshark-certified-analyst-wireshark-released-official-certification-for-security-professionals/</loc>
		<lastmod>2025-06-04T11:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-crocodilus-malware-grants-full-control-over-android-devices/</loc>
		<lastmod>2025-06-04T11:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aspm-losungen-erkennen-priorisieren-und-beseitigen-gefahren-fruhzeitig-security-by-design-schutzt-anwendungen-uber-den-gesamten-lebenszyklus/</loc>
		<lastmod>2025-06-04T11:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarkomponenten-angreifbar-35-000-admin-panels-frei-zuganglich-im-netz/</loc>
		<lastmod>2025-06-04T11:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-certificate-authorities-booted-from-the-good-graces-of-chrome/</loc>
		<lastmod>2025-06-04T12:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-chrome-zero-day-with-in-the-wild-exploit-cve-2025-5419/</loc>
		<lastmod>2025-06-04T12:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-attack-uses-malicious-chrome-edge-extensions-to-steal-sensitive-data/</loc>
		<lastmod>2025-06-04T12:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-9-haufigsten-cyberangriffe-auf-diese-cyberattacken-mussen-unternehmen-vorbereitet-sein/</loc>
		<lastmod>2025-06-04T12:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-npm-and-ruby-packages-exposed-in-ongoing-open-source-supply-chain-attacks/</loc>
		<lastmod>2025-06-04T12:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt37-hackers-fake-academic-forum-invites-to-deliver-malicious-lnk-files-via-dropbox-platform/</loc>
		<lastmod>2025-06-04T12:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/35000-internet-connected-solar-power-systems-vulnerable-to-cyberattacks/</loc>
		<lastmod>2025-06-04T12:07:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-auf-industrieunternehmen-bis-zu-funf-millionen-us-dollar-schaden/</loc>
		<lastmod>2025-06-04T12:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-be-a-statistic-proactive-api-security-in-the-age-of-ai/</loc>
		<lastmod>2025-06-04T13:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ramifications-of-ukraines-drone-attack/</loc>
		<lastmod>2025-06-04T13:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-certificate-authorities-booted-from-the-good-graces-of-chrome/</loc>
		<lastmod>2025-06-04T13:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-ceo-subscription-deals-surging-as-falcon-flex-is-a-home-run/</loc>
		<lastmod>2025-06-04T13:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acreed-infostealer-poised-to-replace-lumma-after-global-crackdown/</loc>
		<lastmod>2025-06-04T13:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-storeonce-faces-critical-cve-2025-37093-vulnerability-urges-immediate-patch-upgrade/</loc>
		<lastmod>2025-06-04T13:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-protect-your-online-presence-from-devastating-ddos-attacks/</loc>
		<lastmod>2025-06-04T13:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roundcube-webmail-under-fire-critical-exploit-found-after-a-decade/</loc>
		<lastmod>2025-06-04T13:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-authentication-coercion-attacks-present-major-risks-to-enterprise-networks/</loc>
		<lastmod>2025-06-04T13:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-approach-security-in-the-era-of-ai-agents/</loc>
		<lastmod>2025-06-04T13:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widespread-campaign-targets-cybercriminals-and-gamers/</loc>
		<lastmod>2025-06-04T13:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-device-theft-causes-more-data-loss-than-ransomware/</loc>
		<lastmod>2025-06-04T13:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkliste-die-top-10-merkmale-fur-mdr-services/</loc>
		<lastmod>2025-06-04T13:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-konto-viele-zugriffe-was-passiert-wenn-dein-netflix-passwort-plotzlich-viral-geht/</loc>
		<lastmod>2025-06-04T13:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mysterioser-hacker-enttarnt-verantwortliche-hinter-ransomware-was-er-damit-erreichen-will/</loc>
		<lastmod>2025-06-04T13:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-als-ein-algorithmus-wie-ki-die-cybersicherheit-auf-ein-neues-level-hebt/</loc>
		<lastmod>2025-06-04T13:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-enhances-codex-and-agents-sdk-for-improved-ai-development/</loc>
		<lastmod>2025-06-04T14:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coinbase-aware-of-data-breach-since-january-report-reveals/</loc>
		<lastmod>2025-06-04T14:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-unveils-claude-4-family-and-new-ai-models/</loc>
		<lastmod>2025-06-04T14:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-unveils-gemini-nano-for-on-device-ai-in-android-apps/</loc>
		<lastmod>2025-06-04T14:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ceo-jay-chaudhrys-five-boldest-statements-at-zenith-live-2025/</loc>
		<lastmod>2025-06-04T14:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-3000-north-face-website-customer-accounts-breached-as-retail-incidents-continue/</loc>
		<lastmod>2025-06-04T14:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crims-stole-40000-peoples-data-from-our-network-admits-publisher-lee-enterprises/</loc>
		<lastmod>2025-06-04T14:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/see-how-much-faster-a-quantum-computer-will-crack-encryption/</loc>
		<lastmod>2025-06-04T14:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-saas-data-isnt-safe-why-traditional-dlp-solutions-fail-in-the-browser-era/</loc>
		<lastmod>2025-06-04T14:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-concern-grows-over-agentic-ai-security-risks/</loc>
		<lastmod>2025-06-04T14:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-uses-fake-booking-com-emails-to-deliver-malware/</loc>
		<lastmod>2025-06-04T14:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-uk-retail-hack-was-subtle-not-complex-says-river-island-ciso/</loc>
		<lastmod>2025-06-04T14:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundeslagebild-cybercrime-2024-bedrohungslage-in-deutschland-ist-anhaltend-hoch/</loc>
		<lastmod>2025-06-04T14:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-vishing-to-breach-salesforce-customers-and-swipe-data/</loc>
		<lastmod>2025-06-04T15:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraines-military-intelligence-claims-cyberattack-on-russian-strategic-bomber-maker/</loc>
		<lastmod>2025-06-04T15:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-chipmaker-qualcomm-fixes-three-zero-days-exploited-by-hackers/</loc>
		<lastmod>2025-06-04T15:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-fixed-multiple-flaws-in-its-storeonce-software/</loc>
		<lastmod>2025-06-04T15:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/media-giant-lee-enterprises-says-data-breach-affects-39000-people/</loc>
		<lastmod>2025-06-04T15:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-salesforce-accounts-in-data-extortion-attacks/</loc>
		<lastmod>2025-06-04T15:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kerberos-as-rep-roasting-attacks-what-you-need-to-know/</loc>
		<lastmod>2025-06-04T15:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-targets-other-hackers-and-gamers-with-backdoored-github-code/</loc>
		<lastmod>2025-06-04T15:05:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-sleeper-agent-browser-extensions-infected-1-5-million-users-globally/</loc>
		<lastmod>2025-06-04T15:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aembit-recognized-on-the-2025-rising-in-cyber-list-of-top-cybersecurity-startups/</loc>
		<lastmod>2025-06-04T15:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-of-device-code-phishing/</loc>
		<lastmod>2025-06-04T15:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chaos-rat-malware-targets-windows-and-linux-via-fake-network-tool-downloads/</loc>
		<lastmod>2025-06-04T15:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-simplicity-should-guide-cybersecurity-purchasing-decisions/</loc>
		<lastmod>2025-06-04T15:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teletrust-positionspapier-neue-forderungen-fur-die-cybernation/</loc>
		<lastmod>2025-06-04T15:07:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sageone-von-txone-networks-erhalt-erweiterte-funktionen-zur-schwachstellenbehebung/</loc>
		<lastmod>2025-06-04T15:07:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/debatte-in-grosbritannien-gestohlene-smartphones-sollen-cloudzugang-verlieren/</loc>
		<lastmod>2025-06-04T15:08:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-reasons-you-should-have-paid-commercial-support-for-java/</loc>
		<lastmod>2025-06-04T16:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-workforce-cut-by-nearly-one-third-so-far/</loc>
		<lastmod>2025-06-04T16:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-malicious-version-of-salesforce-tool-for-data-theft-extortion/</loc>
		<lastmod>2025-06-04T16:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-cybercriminals-targeting-salesforce-app-to-steal-data-extort-companies/</loc>
		<lastmod>2025-06-04T16:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-it-support-calls-hit-20-orgs-end-in-stolen-salesforce-data-and-extortion-google-warns/</loc>
		<lastmod>2025-06-04T16:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-eleven11bot-hacks-86000-ip-cameras-for-large-scale-ddos-attack/</loc>
		<lastmod>2025-06-04T16:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lumma-infostealer-developers-persist-in-their-malicious-activities/</loc>
		<lastmod>2025-06-04T16:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-impersonate-ruby-packages-to-steal-sensitive-telegram-data/</loc>
		<lastmod>2025-06-04T16:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/photoshop-for-beginners-overview-of-top-skills-and-how-to-hone-them/</loc>
		<lastmod>2025-06-04T16:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-fake-it-support-calls-to-steal-salesforce-data/</loc>
		<lastmod>2025-06-04T16:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-cybersecurity-support-networks-too-fragmented-for-smbs-say-experts/</loc>
		<lastmod>2025-06-04T16:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-tiktoks-virtual-machine-tells-us-about-modern-bot-defenses/</loc>
		<lastmod>2025-06-04T17:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vast-array-of-solar-power-equipment-left-exposed-online/</loc>
		<lastmod>2025-06-04T17:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-newspaper-giant-lee-enterprises-affects-40000-people/</loc>
		<lastmod>2025-06-04T17:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-forms-eu-based-cloud-unit-as-customers-fret-about-trump-2-0/</loc>
		<lastmod>2025-06-04T17:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-nft-airdrop-scams-targeting-hedera-hashgraph-wallets/</loc>
		<lastmod>2025-06-04T17:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-hackers-target-it-support-teams-bypass-multi-factor-authentication/</loc>
		<lastmod>2025-06-04T17:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dcrat-targets-latin-american-users-to-steal-banking-credentials/</loc>
		<lastmod>2025-06-04T17:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-exposes-vishing-group-unc6040-targeting-salesforce-with-fake-data-loader-app/</loc>
		<lastmod>2025-06-04T17:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-cloud-native-technology-prompts-new-security-approaches/</loc>
		<lastmod>2025-06-04T17:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metas-secret-spyware-local-mess-hack-tracks-you-across-the-web/</loc>
		<lastmod>2025-06-04T18:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-198k-in-grants-awarded-to-boost-cybersecurity-workforce-in-massachusetts/</loc>
		<lastmod>2025-06-04T18:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automation-you-can-trust-cut-backlogs-without-breaking-builds/</loc>
		<lastmod>2025-06-04T18:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newspaper-giant-lee-enterprises-says-nearly-40000-social-security-numbers-leaked-in-ransomware-attack/</loc>
		<lastmod>2025-06-04T18:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrikes-former-cto-on-cyber-rivalries-and-how-automation-can-undermine-security-for-early-stage-startups/</loc>
		<lastmod>2025-06-04T18:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-buffer-overflow-in-schneider-home-devices/</loc>
		<lastmod>2025-06-04T18:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-outlines-three-pronged-european-cyber-strategy/</loc>
		<lastmod>2025-06-04T18:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-should-rescind-uk-data-adequacy/</loc>
		<lastmod>2025-06-04T18:04:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosecurity-2025-smes-feel-on-their-own-in-the-face-of-cyber-attacks/</loc>
		<lastmod>2025-06-04T18:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-terraform-leads-ibm-red-hat-integration-roadmap/</loc>
		<lastmod>2025-06-04T18:04:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/will-massive-security-glossary-from-microsoft-google-crowdstrike-palo-alto-improve-collaboration/</loc>
		<lastmod>2025-06-04T18:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bidencash-carding-market-domains-seized-in-international-operation/</loc>
		<lastmod>2025-06-04T18:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploiting-clickfix-amos-macos-stealer-evades-security-to-deploy-malicious-code/</loc>
		<lastmod>2025-06-04T18:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-malware-loaders-to-circumvent-android-13-accessibility-safeguards/</loc>
		<lastmod>2025-06-04T18:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-bypass-deepfake-detection-with-replay-attacks/</loc>
		<lastmod>2025-06-04T18:05:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-customers-duped-by-series-of-social-engineering-attacks/</loc>
		<lastmod>2025-06-04T19:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exclusive-hackers-leak-86-million-att-records-with-decrypted-ssns/</loc>
		<lastmod>2025-06-04T19:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockbit-crackdown-fragmented-russian-cybercrime-groups/</loc>
		<lastmod>2025-06-04T19:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-claims-it-hacked-tupolev-russias-strategic-warplane-maker/</loc>
		<lastmod>2025-06-04T19:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-neuroscience-can-help-us-battle-alert-fatigue/</loc>
		<lastmod>2025-06-04T19:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/100000-uk-taxpayer-accounts-hit-in-47m-phishing-attack-on-hmrc/</loc>
		<lastmod>2025-06-04T19:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experten-zweifeln-sicherheit-von-musks-neuem-xchat-an/</loc>
		<lastmod>2025-06-04T19:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-nutzer-warum-ihr-euch-jetzt-in-euren-account-einloggen-solltet/</loc>
		<lastmod>2025-06-04T19:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-idea-to-outcome-how-wwt-is-leading-the-ai-security-conversation-at-scale/</loc>
		<lastmod>2025-06-04T20:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-launches-free-security-program-for-european-governments/</loc>
		<lastmod>2025-06-04T20:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-garbage-collection-in-v8/</loc>
		<lastmod>2025-06-04T20:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-check-engine/</loc>
		<lastmod>2025-06-04T20:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-isnt-a-solo-sport-community-burnout-and-identity-at-bsides312/</loc>
		<lastmod>2025-06-04T20:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-finding-and-exploiting-20-year-old-bugs-in-web-browsers/</loc>
		<lastmod>2025-06-04T20:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bidencash-darknet-forum-taken-down-by-us-dutch-law-enforcement/</loc>
		<lastmod>2025-06-04T20:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-claims-responsibility-for-kettering-health-hack/</loc>
		<lastmod>2025-06-04T20:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-scum-leak-patient-data-after-disrupting-chemo-treatments-at-kettering/</loc>
		<lastmod>2025-06-04T20:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-forgotten-details-of-ransomware-response-plans/</loc>
		<lastmod>2025-06-04T20:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-browsers-boost-security-without-sacrificing-speed/</loc>
		<lastmod>2025-06-04T20:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-arrested-for-breaching-5000-hosting-accounts-to-mine-crypto/</loc>
		<lastmod>2025-06-04T20:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-ise-and-ccp-flaws-with-public-exploit-code/</loc>
		<lastmod>2025-06-04T20:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/web-application-firewall-waf-best-practices-for-optimal-security/</loc>
		<lastmod>2025-06-04T21:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-seize-carder-site-bidencash/</loc>
		<lastmod>2025-06-04T21:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-identity-security-still-lags-in-healthcare-sector/</loc>
		<lastmod>2025-06-04T21:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-free-eu-cybersecurity-program-for-governments/</loc>
		<lastmod>2025-06-04T21:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-play-ransomware-breached-900-victims-including-critical-orgs/</loc>
		<lastmod>2025-06-04T21:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managedmethods-wins-2025-best-overall-it-solution-for-the-education-market/</loc>
		<lastmod>2025-06-04T22:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-is-here-to-stay-can-it-ever-be-secure/</loc>
		<lastmod>2025-06-04T22:06:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-strikes-russian-bomber-maker-with-hack-attack/</loc>
		<lastmod>2025-06-04T22:06:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-code-repos-open-to-supply-chain-attacks-researchers-warn/</loc>
		<lastmod>2025-06-04T22:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/file-security-best-practices-in-banking-protecting-digital-assets-in-a-complex-threat-landscape/</loc>
		<lastmod>2025-06-04T22:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trustifi-raises-25-million-for-its-ai-channel-first-email-security/</loc>
		<lastmod>2025-06-04T22:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-leaders-really-need-now-insights-from-levelblues-theresa-lanowitz/</loc>
		<lastmod>2025-06-04T22:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/portnox-and-crowdstrike-integration-brings-real-time-risk-based-access-control-to-enterprise-networks/</loc>
		<lastmod>2025-06-04T22:07:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trace3-acquires-ivoxy-to-expand-data-center-expertise-and-pacific-northwest-presence/</loc>
		<lastmod>2025-06-04T22:07:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cribl-launches-copilot-editor-to-streamline-telemetry-data-transformation-for-it-and-security-teams/</loc>
		<lastmod>2025-06-04T22:07:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/group-ib-ceo-firms-lack-cyber-threat-direction/</loc>
		<lastmod>2025-06-04T22:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-defense-unit-elevated-to-new-command-status/</loc>
		<lastmod>2025-06-04T22:08:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-takes-down-covert-propaganda-networks/</loc>
		<lastmod>2025-06-04T22:08:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dia-it-specialist-charged-in-espionage-attempt/</loc>
		<lastmod>2025-06-04T22:08:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vec-attacks-outpace-bec-in-emea-a-growing-challenge-for-mssps/</loc>
		<lastmod>2025-06-04T22:08:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-bill-seeks-unified-energy-cyber-response/</loc>
		<lastmod>2025-06-04T22:09:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-networks-secures-55m-to-advance-microsegmentation-platform/</loc>
		<lastmod>2025-06-04T22:09:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gao-finds-backup-data-testing-gaps-in-login-gov/</loc>
		<lastmod>2025-06-04T22:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cmmc-compliance-is-a-wake-up-call-for-msps-and-mssps/</loc>
		<lastmod>2025-06-04T22:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/considerable-compromise-likely-with-critical-decade-old-roundcube-flaw/</loc>
		<lastmod>2025-06-04T22:09:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cisa-director-national-cyber-director-picks-obtain-industry-support/</loc>
		<lastmod>2025-06-04T22:10:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-embraces-ai-agents-in-its-security-platform-with-fletch-acquisition/</loc>
		<lastmod>2025-06-04T22:10:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fixes-issued-for-actively-exploited-qualcomm-zero-days/</loc>
		<lastmod>2025-06-04T22:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-hpe-storeonce-vulnerabilities-addressed-in-new-update/</loc>
		<lastmod>2025-06-04T22:10:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-eradicates-indian-grocery-startups-data/</loc>
		<lastmod>2025-06-04T22:10:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/separate-cyberattacks-impact-ohio-oklahoma-puerto-rico/</loc>
		<lastmod>2025-06-04T22:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-us-patient-data-exposed-by-mongodb-misconfiguration/</loc>
		<lastmod>2025-06-04T22:11:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/livingthe-land-tactics-evident-in-most-major-cyberattacks/</loc>
		<lastmod>2025-06-04T22:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vast-data-and-cisco-partner-on-unified-ai-infrastructure-for-enterprises/</loc>
		<lastmod>2025-06-04T22:11:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mounting-cyberattacks-hit-manufacturing-ot-systems/</loc>
		<lastmod>2025-06-04T22:11:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telegram-data-targeted-by-fastlane-impersonating-rubygems-packages/</loc>
		<lastmod>2025-06-04T22:12:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hoax-booking-com-sites-leveraged-for-asyncrat-delivery/</loc>
		<lastmod>2025-06-04T22:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netsupport-rat-spread-via-bogus-gitcode-docusign-sites/</loc>
		<lastmod>2025-06-04T22:12:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novel-lyrix-ransomware-sets-sights-on-windows-systems/</loc>
		<lastmod>2025-06-04T22:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-involving-connectwise-screenconnect-bug-underway/</loc>
		<lastmod>2025-06-04T22:12:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-enables-the-benefits-of-ai-while-protecting-against-its-risks/</loc>
		<lastmod>2025-06-04T22:13:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-can-help-teams-offset-the-skills-shortage/</loc>
		<lastmod>2025-06-04T22:13:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-to-drop-trust-of-chunghwa-and-netlock-certificates-from-chrome/</loc>
		<lastmod>2025-06-04T22:13:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-trojan-crocodilus-hijacks-accessibility-settings-for-control/</loc>
		<lastmod>2025-06-04T22:13:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraines-military-intelligence-agency-stole-4-4gb-of-highly-classified-internal-data-from-tupolev/</loc>
		<lastmod>2025-06-04T22:13:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-commerce-secretary-defends-export-controls-crackdown/</loc>
		<lastmod>2025-06-04T22:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vishing-crew-targets-salesforce-data/</loc>
		<lastmod>2025-06-04T22:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-turns-against-us-firetail-blog/</loc>
		<lastmod>2025-06-04T23:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-seize-145-domains-associated-with-bidencash-cybercrime-platform/</loc>
		<lastmod>2025-06-04T23:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bis-zu-funf-millionen-us-dollar-schaden-nach-cyberangriffen-auf-industrieunternehmen/</loc>
		<lastmod>2025-06-04T23:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-crowdstrike-lead-effort-to-map-threat-actor-names/</loc>
		<lastmod>2025-06-04T23:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-seize-bidencash-carding-market-and-its-crypto-profits/</loc>
		<lastmod>2025-06-04T23:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uae-central-bank-tells-fis-to-drop-sms-otp-authentication/</loc>
		<lastmod>2025-06-04T23:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quiet-moments-matter-building-resilience-amid-cyber-crises/</loc>
		<lastmod>2025-06-04T23:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/35k-solar-devices-vulnerable-to-potential-hijacking/</loc>
		<lastmod>2025-06-04T23:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-quietly-scales-back-rules-for-courthouse-raids/</loc>
		<lastmod>2025-06-04T23:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-challenges-implementing-dmarc-for-microsoft-365/</loc>
		<lastmod>2025-06-05T00:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peak-traffic-peak-threat-defending-e-commerce-during-frances-soldes-season/</loc>
		<lastmod>2025-06-05T00:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minimierung-von-schwachstellen-in-ot-umgebungen/</loc>
		<lastmod>2025-06-05T00:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/play-ransomware-crims-exploit-simplehelp-flaw-in-double-extortion-schemes/</loc>
		<lastmod>2025-06-05T00:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/investigatory-powers-guidelines-for-police-and-spies-could-also-help-businesses-with-ai/</loc>
		<lastmod>2025-06-05T00:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-arc-browser-story-reveals-about-the-future-of-browser-security/</loc>
		<lastmod>2025-06-05T04:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/satisfying-compliance-demands-with-enhanced-cloud-security/</loc>
		<lastmod>2025-06-05T04:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/independence-in-managing-cloud-secrets-safely/</loc>
		<lastmod>2025-06-05T04:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feeling-reassured-by-your-cybersecurity-measures/</loc>
		<lastmod>2025-06-05T04:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einmal-in-die-cloud-und-wieder-zuruck-unternehmen-wollen-wieder-mehr-kontrolle-uber-ihre-it-infrastruktur/</loc>
		<lastmod>2025-06-05T04:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-chair-implores-congress-to-strengthen-childrens-online-privacy-protection-law/</loc>
		<lastmod>2025-06-05T04:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfassender-und-von-gartner-bestatigter-schutz-fur-web-anwendungen-und-apis/</loc>
		<lastmod>2025-06-05T04:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/den-tarifchaos-bei-us-zollen-nutzen-cyberkriminelle-zunehmend-fur-online-betrug/</loc>
		<lastmod>2025-06-05T04:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-und-yandex-hebeln-sandboxing-aus-und-tracken-nutzer/</loc>
		<lastmod>2025-06-05T04:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-cloud-login-breaks-for-second-time-this-week-and-big-blue-isnt-saying-why/</loc>
		<lastmod>2025-06-05T04:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-yandex-covertly-tracked-billions-of-android-users-according-to-researcher/</loc>
		<lastmod>2025-06-05T04:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technische-schulden-gefahrden-die-einfuhrung-von-ki/</loc>
		<lastmod>2025-06-05T05:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-in-zeiten-geopolitischer-unsicherheit/</loc>
		<lastmod>2025-06-05T05:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-sap-security-updates-are-a-struggle-for-large-enterprises/</loc>
		<lastmod>2025-06-05T05:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-organizations-are-at-a-turning-point-with-ai/</loc>
		<lastmod>2025-06-05T05:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-accuses-taiwan-of-running-five-feeble-apt-gangs-with-us-help/</loc>
		<lastmod>2025-06-05T06:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cloud-security-crisis-no-ones-talking-about/</loc>
		<lastmod>2025-06-05T06:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-survey-shows-americans-are-changing-how-they-fight-scams/</loc>
		<lastmod>2025-06-05T06:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mithilfe-von-sicherheitslucken-in-ivanti-epmm-chinesische-hacker-greifen-kritis-unternehmen-in-europa-an/</loc>
		<lastmod>2025-06-05T06:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/addressing-api-security-with-nist-sp-800-228/</loc>
		<lastmod>2025-06-05T07:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-against-attacks-how-waf-rate-limiting-works/</loc>
		<lastmod>2025-06-05T07:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-kept-15-year-old-zombie-vuln-alive-but-its-time-is-drawing-near/</loc>
		<lastmod>2025-06-05T07:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-seized-the-carding-marketplace-bidencash/</loc>
		<lastmod>2025-06-05T07:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-open-sources-ai-tool-to-automatically-classify-sensitive-documents/</loc>
		<lastmod>2025-06-05T07:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-offers-10m-for-tips-on-state-hackers-tied-to-redline-malware/</loc>
		<lastmod>2025-06-05T07:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-training-in-africa-aims-to-bolster-professionals-ranks/</loc>
		<lastmod>2025-06-05T07:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-ise-auth-bypass-flaw-impacts-cloud-deployments-on-aws-azure-and-oci/</loc>
		<lastmod>2025-06-05T07:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-sicherheit-fur-hybride-it-infrastrukturen-maximale-datensouveranitat-durch-zero-trust-eu-cloud/</loc>
		<lastmod>2025-06-05T07:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/get-out-of-the-audit-committee-why-cisos-need-dedicated-board-time/</loc>
		<lastmod>2025-06-05T08:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-claims-kettering-health-breach-leaks-stolen-data/</loc>
		<lastmod>2025-06-05T08:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-authorities-shut-down-major-dark-web-marketplace-with-117000-users/</loc>
		<lastmod>2025-06-05T08:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outlook-users-targeted-by-new-html-based-phishing-scheme/</loc>
		<lastmod>2025-06-05T08:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zertifikate-schlussel-secrets-zugriffstoken-und-kurze-lebenszyklen-schaffen-probleme-was-tun-mit-der-schnell-wachsenden-zahl-maschineller-identitaten/</loc>
		<lastmod>2025-06-05T08:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geheime-daten-erbeutet-ukraine-will-russischen-bomber-hersteller-gehackt-haben/</loc>
		<lastmod>2025-06-05T08:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisecops-the-next-shift-left-for-securing-ai-applications/</loc>
		<lastmod>2025-06-05T09:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-alerts-users-to-critical-ise-vulnerability-exposing-sensitive-data/</loc>
		<lastmod>2025-06-05T09:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-securing-endpoints-is-still-vital-amid-changing-threats/</loc>
		<lastmod>2025-06-05T09:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sailpoint-studie-zeigt-ki-agenten-breiten-sich-rasant-aus/</loc>
		<lastmod>2025-06-05T09:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-deutschen-pappspezialist-wellteam/</loc>
		<lastmod>2025-06-05T10:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-cisco-ise-impacts-cloud-deployments-on-aws-microsoft-azure-and-oracle-cloud-infrastructure/</loc>
		<lastmod>2025-06-05T10:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vile-gang-members-sentenced-for-extortion-police-portal-breach/</loc>
		<lastmod>2025-06-05T10:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-ttps-iocs-for-play-ransomware-that-hacked-900-orgs/</loc>
		<lastmod>2025-06-05T10:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-nexus-dashboard-vulnerability-lets-attackers-impersonate-managed-devices/</loc>
		<lastmod>2025-06-05T10:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-bladedfeline-hides-in-network-for-8-years/</loc>
		<lastmod>2025-06-05T10:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-server-2025-mit-azure-arc-und-azure-update-manager-verbinden-server-lokal-betreiben-und-uber-azure-absichern/</loc>
		<lastmod>2025-06-05T10:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fur-datenklau-hacker-kapern-reihenweise-salesforce-zugange/</loc>
		<lastmod>2025-06-05T10:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newly-identified-wiper-malware-pathwiper-targets-critical-infrastructure-in-ukraine/</loc>
		<lastmod>2025-06-05T11:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nutzen-virtuelle-maschine-als-tarnkappe/</loc>
		<lastmod>2025-06-05T11:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hmrc-crooks-broke-into-100k-accounts-stole-43m-from-british-taxpayer-in-late-2024/</loc>
		<lastmod>2025-06-05T11:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-sets-out-how-to-build-cyber-safe-cultures/</loc>
		<lastmod>2025-06-05T11:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/put-rocs-before-socs-qualys-tells-public-sector/</loc>
		<lastmod>2025-06-05T11:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-really-happened-in-the-aftermath-of-the-lizard-squad-hacks/</loc>
		<lastmod>2025-06-05T11:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/start-your-tech-career-with-a-fundamental-it-training-bundle-thats-only-25/</loc>
		<lastmod>2025-06-05T11:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc6040-apt-hackers-steals-salesforce-data-without-exploit-any-vulnerabilities/</loc>
		<lastmod>2025-06-05T11:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenmanagement-und-modularer-speicheransatz-skalierbarkeit-sicherheit-und-compliance-bei-der-datenverwaltung/</loc>
		<lastmod>2025-06-05T11:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsexperten-kommentieren-das-bka-bundeslagebild-cybercrime-2024/</loc>
		<lastmod>2025-06-05T11:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-imc-vulnerability-allows-attackers-to-gain-elevated-privileges/</loc>
		<lastmod>2025-06-05T11:08:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pinterest-enhances-reliability-and-quality-amid-ai-content-flood/</loc>
		<lastmod>2025-06-05T11:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-baut-dach-prasenz-weiter-aus/</loc>
		<lastmod>2025-06-05T11:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pathwiper-russia-linked-apt-deploys-new-wiper-malware-against-ukrainian-infrastructure/</loc>
		<lastmod>2025-06-05T11:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-everywhere-schutz-fur-daten-in-zweigstellen-multicloud-und-remote-umgebungen/</loc>
		<lastmod>2025-06-05T12:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wege-zur-quantenresistenz/</loc>
		<lastmod>2025-06-05T12:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-fines-vodafone-51-million-for-privacy-security-breaches/</loc>
		<lastmod>2025-06-05T12:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/830-organizations-hacked-via-glitch-hosted-phishing-attack-uses-telegram-fake-captchas/</loc>
		<lastmod>2025-06-05T12:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researcher-found-6-critical-vulnerabilities-in-netmri-allow-attackers-gain-complete-admin-access/</loc>
		<lastmod>2025-06-05T12:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-seizes-145-domains-tied-to-bidencash-carding-marketplace-in-global-takedown/</loc>
		<lastmod>2025-06-05T12:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-uk-retail-hack-was-subtle-not-complex-says-river-island-ciso-2/</loc>
		<lastmod>2025-06-05T12:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moderne-sicherheitskonzepte-ganzheitliche-security-architektur-stoppt-moderne-cyberbedrohungen/</loc>
		<lastmod>2025-06-05T12:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-consumer-und-enterprise-massenspeicher-welche-festplatten-und-ssds-eignen-sich-wofur/</loc>
		<lastmod>2025-06-05T12:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdoor-im-code-hacker-trickst-scriptkiddies-mit-fake-trojaner-aus/</loc>
		<lastmod>2025-06-05T12:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta397-gezielte-angriffe-auf-regierungen-und-unternehmen-weltweit/</loc>
		<lastmod>2025-06-05T12:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australia-tightens-data-privacy-laws-till-payments-madhuri-nandi-explains-whats-next/</loc>
		<lastmod>2025-06-05T12:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-zertifiziert-sd-wan-gateway-von-lancom/</loc>
		<lastmod>2025-06-05T12:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/koordinierte-cyberattacken-auf-den-einzelhandel/</loc>
		<lastmod>2025-06-05T12:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cybersecurity-tools-for-higher-education-protecting-institutions/</loc>
		<lastmod>2025-06-05T13:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fips-140-3-and-you-part-three/</loc>
		<lastmod>2025-06-05T13:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secrets-management-in-2025-why-teams-are-moving-on-from-traditional-tools/</loc>
		<lastmod>2025-06-05T13:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outdoor-shop-unterwegs-von-cyberattacke-betroffen/</loc>
		<lastmod>2025-06-05T13:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-launches-european-security-program-to-counter-nation-state-threats/</loc>
		<lastmod>2025-06-05T13:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-hits-rubygems-to-steal-telegram-api-data/</loc>
		<lastmod>2025-06-05T13:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-evidence-links-long-running-hacking-group-to-indian-government/</loc>
		<lastmod>2025-06-05T13:05:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-makes-a-proactive-investment-in-eu-cybersecurity-amid-blocs-tensions-with-us/</loc>
		<lastmod>2025-06-05T13:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phone-unlocking-firm-cellebrite-to-acquire-mobile-testing-startup-corellium-for-170m/</loc>
		<lastmod>2025-06-05T13:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bka-bundeslagebild-cybercrime-erfolgreiche-strafverfolgung-dampft-ransomware-welle-ki-verscharft-bedrohungslage/</loc>
		<lastmod>2025-06-05T13:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-email-scam-alert-fake-booking-com-emails-deliver-malware/</loc>
		<lastmod>2025-06-05T13:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-authenticator-apps-for-2025/</loc>
		<lastmod>2025-06-05T13:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vile-gang-members-sentenced-for-dea-portal-breach-extortion/</loc>
		<lastmod>2025-06-05T13:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-dell-powerscale-vulnerability-allows-attackers-unauthorized-access-to-filesystem/</loc>
		<lastmod>2025-06-05T13:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta397-hackers-exploits-scheduled-tasks-to-deploy-malware-on-targeted-systems/</loc>
		<lastmod>2025-06-05T13:06:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-nsx-xss-vulnerability-exposes-systems-to-malicious-code-injection/</loc>
		<lastmod>2025-06-05T13:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-new-html-trick-to-deceive-outlook-users-into-clicking-malicious-links/</loc>
		<lastmod>2025-06-05T13:07:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wireshark-vulnerability-allows-attackers-to-launch-dos-attacks/</loc>
		<lastmod>2025-06-05T13:07:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/redefining-cyber-value-why-business-impact-should-lead-the-security-conversation/</loc>
		<lastmod>2025-06-05T13:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-bladedfeline-hits-iraqi-and-kurdish-targets-with-whisper-and-spearal-malware/</loc>
		<lastmod>2025-06-05T13:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-seven-steps-to-building-a-mature-vulnerability-management-program/</loc>
		<lastmod>2025-06-05T13:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartphones-am-flughafen-laden-warum-ihr-einen-bogen-um-usb-steckplatze-machen-solltet/</loc>
		<lastmod>2025-06-05T13:08:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-escape-copilot-automate-app-and-scan-management-via-mcp/</loc>
		<lastmod>2025-06-05T14:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-beware-genai-use-is-outpacing-security-controls/</loc>
		<lastmod>2025-06-05T14:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-erbeuten-salesforce-daten-mit-vishing/</loc>
		<lastmod>2025-06-05T14:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onespan-acquires-nok-nok-labs-for-expanded-push-on-passwordless/</loc>
		<lastmod>2025-06-05T14:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-tax-authority-reveals-scammers-stole-47-million/</loc>
		<lastmod>2025-06-05T14:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-play-ransomware-gang-has-attacked-600-organizations-since-2023/</loc>
		<lastmod>2025-06-05T14:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rep-garbarino-ending-cisa-mobile-app-security-program-for-feds-sends-wrong-signal/</loc>
		<lastmod>2025-06-05T14:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-unveils-custom-ai-models-for-u-s-national-security-customers/</loc>
		<lastmod>2025-06-05T14:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-gitlab-is-tapping-ai-in-devsecops/</loc>
		<lastmod>2025-06-05T14:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-vishing-threat-particularly-effective-at-tricking-employees-to-steal-salesforce-data/</loc>
		<lastmod>2025-06-05T14:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-offers-free-cyber-security-support-to-european-governments-targeted-by-state-sponsored-hackers/</loc>
		<lastmod>2025-06-05T14:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-defenders-and-attackers-are-locked-in-an-ai-arms-race/</loc>
		<lastmod>2025-06-05T14:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bipartisan-bill-proposes-50m-cyber-threat-analysis-program-for-energy-sector/</loc>
		<lastmod>2025-06-05T15:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banking-groups-urge-sec-to-rescind-biden-era-cybersecurity-rule/</loc>
		<lastmod>2025-06-05T15:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ceo-jay-chaudhry-on-reimagining-security-operations-siem-goes-away/</loc>
		<lastmod>2025-06-05T15:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cellebrite-to-acquire-mobile-testing-firm-corellium-in-200-million-deal/</loc>
		<lastmod>2025-06-05T15:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-a-hundred-backdoored-malware-repos-traced-to-single-github-user/</loc>
		<lastmod>2025-06-05T15:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-94-billion-stolen-cookies-found-on-dark-web/</loc>
		<lastmod>2025-06-05T15:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-free-cyber-security-support-to-european-governments-reflects-deep-enduring-unwavering-commitment/</loc>
		<lastmod>2025-06-05T15:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odoo-employee-database-allegedly-exposed-and-put-up-for-sale-on-dark-web/</loc>
		<lastmod>2025-06-05T15:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/members-of-vile-hacker-group-arrested-for-hacking-dea-portal/</loc>
		<lastmod>2025-06-05T15:05:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finding-balance-in-us-ai-regulation/</loc>
		<lastmod>2025-06-05T15:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-know-your-audience-to-make-an-impact-cisos-tell-their-peers/</loc>
		<lastmod>2025-06-05T15:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-threat-actors-weaponizing-hardware-devices-to-exploit-fortified-environments/</loc>
		<lastmod>2025-06-05T15:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appsec-ist-kaufargument-anwendungssicherheit-wird-zum-entwickler-thema/</loc>
		<lastmod>2025-06-05T15:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-warn-play-ransomware-targeting-critical-infrastructure-with-evolving-techniques/</loc>
		<lastmod>2025-06-05T16:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-finding-a-second-north-star-in-security-operations-partner-services-push/</loc>
		<lastmod>2025-06-05T16:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-police-arrest-hacker-who-used-hosting-firms-servers-to-mine-cryptocurrency/</loc>
		<lastmod>2025-06-05T16:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-detail-bitter-apts-evolving-tactics-as-its-geographic-scope-expands/</loc>
		<lastmod>2025-06-05T16:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/questions-swirl-around-connectwise-flaw-used-in-attacks/</loc>
		<lastmod>2025-06-05T16:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yet-another-exposed-database-this-time-with-184-million-records/</loc>
		<lastmod>2025-06-05T17:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-links-hospital-outages-crypto-botnets-and-sneaky-zip-files-a-ransomware-chaos/</loc>
		<lastmod>2025-06-05T17:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elevating-the-ciso-to-business-enabler-with-crq-kovrr/</loc>
		<lastmod>2025-06-05T17:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-policy-management-how-sonatype-supports-security-at-scale/</loc>
		<lastmod>2025-06-05T17:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-are-stealing-salesforce-data-google-warns/</loc>
		<lastmod>2025-06-05T17:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-enzoic-for-active-directory-3-6/</loc>
		<lastmod>2025-06-05T17:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-target-kurdish-and-iraqi-officials-in-long-running-cyberespionage-campaign/</loc>
		<lastmod>2025-06-05T17:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-unveils-custom-ai-models-for-us-national-security-customers/</loc>
		<lastmod>2025-06-05T17:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uks-error-prone-evisa-system-is-anxiety-inducing/</loc>
		<lastmod>2025-06-05T17:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-chrome-extensions-leak-api-keys-user-data-via-http-and-hardcoded-credentials/</loc>
		<lastmod>2025-06-05T17:03:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-dns-hijacking-a-major-cyber-threat-for-the-uk-government/</loc>
		<lastmod>2025-06-05T17:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-ransomware-victims-urged-to-engage-to-take-back-control/</loc>
		<lastmod>2025-06-05T17:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-needs-satellite-navigation-not-paper-maps/</loc>
		<lastmod>2025-06-05T18:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/announcing-our-series-a-impart-security/</loc>
		<lastmod>2025-06-05T18:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-us-cyber-officials-face-divergent-paths-after-senate-confirmation/</loc>
		<lastmod>2025-06-05T18:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sean-cairncross-has-policy-coordination-in-mind-if-confirmed-as-national-cyber-director/</loc>
		<lastmod>2025-06-05T18:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bidencash-busted-as-feds-nuke-stolen-credit-card-bazaar/</loc>
		<lastmod>2025-06-05T18:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unsecured-database-exposes-data-of-3-6-million-passion-io-creators/</loc>
		<lastmod>2025-06-05T18:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/old-att-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/</loc>
		<lastmod>2025-06-05T18:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-selling-critical-roundcube-webmail-exploit-as-tech-info-disclosed/</loc>
		<lastmod>2025-06-05T18:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/designing-a-windows-service-for-security/</loc>
		<lastmod>2025-06-05T18:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-of-fake-zoom-client-downloads-granting-attackers-access-to-your-computer/</loc>
		<lastmod>2025-06-05T18:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-admins-cautioned-about-fake-cache-plugin-stealing-admin-credentials/</loc>
		<lastmod>2025-06-05T18:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akamai-extends-cybersecurity-reach-to-dns-posture-management/</loc>
		<lastmod>2025-06-05T19:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-cyberbullying-risks-for-schools/</loc>
		<lastmod>2025-06-05T19:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-national-cyber-director-nominee-grilled-about-his-resume-proposed-spending-cuts/</loc>
		<lastmod>2025-06-05T19:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everyones-on-the-cyber-target-list/</loc>
		<lastmod>2025-06-05T19:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kde-targets-windows-10-exiles-claiming-your-computer-is-toast/</loc>
		<lastmod>2025-06-05T19:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-us-sec-drops-civil-case-against-binance/</loc>
		<lastmod>2025-06-05T19:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vipersoftx-malware-enhances-modularity-stealth-and-persistence-techniques/</loc>
		<lastmod>2025-06-05T19:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-accuses-taiwan-of-operating-apt-groups-with-us-support/</loc>
		<lastmod>2025-06-05T19:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdoored-malware-reels-in-newbie-cybercriminals/</loc>
		<lastmod>2025-06-05T19:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-cybersecurity-lessons-from-maersks-former-ciso/</loc>
		<lastmod>2025-06-05T19:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-czar-pick-grilled-over-cisa-cuts-if-we-have-a-cyber-9-11-youre-the-guy/</loc>
		<lastmod>2025-06-05T20:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/att-hit-by-massive-reported-identity-data-leak-again/</loc>
		<lastmod>2025-06-05T20:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersentriq-and-netgear-both-courting-msps/</loc>
		<lastmod>2025-06-05T20:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ross-ulbricht-got-a-31-million-donation-from-a-dark-web-dealer-crypto-tracers-suspect/</loc>
		<lastmod>2025-06-05T20:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-bladedfeline-remains-hidden-in-networks-for-8-years/</loc>
		<lastmod>2025-06-05T20:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chaos-rat-targets-linux-and-windows-users-to-steal-sensitive-data/</loc>
		<lastmod>2025-06-05T20:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-national-cyber-director-nominee-dodges-criticism-of-funding-cuts/</loc>
		<lastmod>2025-06-05T21:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/water-utilities-mitigate-equipment-flaws-after-researchers-find-widespread-exposures/</loc>
		<lastmod>2025-06-05T21:07:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cellebrite-buys-corellium-to-help-cops-bust-phone-encryption/</loc>
		<lastmod>2025-06-05T21:07:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-patches-identity-services-engine-flaw-affecting-aws-azure-oci/</loc>
		<lastmod>2025-06-05T21:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/changes-in-the-channel-people-moves-and-shakeups-june-2-6/</loc>
		<lastmod>2025-06-05T21:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grip-security-launches-itdr-2-0-to-strengthen-saas-identity-protection/</loc>
		<lastmod>2025-06-05T21:08:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-management-firm-axiad-launches-formal-partner-program/</loc>
		<lastmod>2025-06-05T21:08:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-and-noma-security-partner-to-deliver-enterprise-grade-ai-security-and-governance-at-scale/</loc>
		<lastmod>2025-06-05T21:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stolen-credentials-and-missing-mfa-continue-to-fuel-breaches-create-mssp-risk-and-opportunity/</loc>
		<lastmod>2025-06-05T21:08:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nominations-open-sc-medias-2025-women-in-it-security/</loc>
		<lastmod>2025-06-05T21:08:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-updates-siem-and-endpoint-tools-for-msps-mssps/</loc>
		<lastmod>2025-06-05T21:09:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatspike-raises-14m-to-expand-unified-security-platform/</loc>
		<lastmod>2025-06-05T21:09:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-cyber-command-signed-into-law/</loc>
		<lastmod>2025-06-05T21:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-robust-childrens-online-privacy-law-sought-by-ftc-chair/</loc>
		<lastmod>2025-06-05T21:09:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stolen-insecure-credentials-behind-most-breaches/</loc>
		<lastmod>2025-06-05T21:09:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/almost-35k-solar-power-systems-vulnerable-to-remote-attacks/</loc>
		<lastmod>2025-06-05T21:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ramnit-malware-compromise-in-industrial-orgs-spikes/</loc>
		<lastmod>2025-06-05T21:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-among-most-targeted-by-ddos-intrusions-study-finds/</loc>
		<lastmod>2025-06-05T21:10:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-aerospace-firm-breach-claimed-by-ukraine/</loc>
		<lastmod>2025-06-05T21:10:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/almost-40k-impacted-by-lee-enterprises-ransomware-attack/</loc>
		<lastmod>2025-06-05T21:10:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/american-hospital-dubai-breach-purportedly-compromised-450m-records/</loc>
		<lastmod>2025-06-05T21:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-takes-responsibility-for-kettering-health-hack/</loc>
		<lastmod>2025-06-05T21:11:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-pilfered-att-records-exposed/</loc>
		<lastmod>2025-06-05T21:11:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widespread-sleeper-agent-browser-extension-compromise-uncovered/</loc>
		<lastmod>2025-06-05T21:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-extortion-attacks-hit-salesforce-customers/</loc>
		<lastmod>2025-06-05T21:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-unifies-security-and-compliance-with-gravityzone-compliance-manager/</loc>
		<lastmod>2025-06-05T21:12:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/play-ransomware-toll-mounts-amid-ongoing-evolution/</loc>
		<lastmod>2025-06-05T21:12:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bidencash-subjected-to-global-takedown-operation/</loc>
		<lastmod>2025-06-05T21:12:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-faces-probes-after-global-it-outage/</loc>
		<lastmod>2025-06-05T21:12:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-compliance-a-competitive-advantage-not-a-mere-obligation/</loc>
		<lastmod>2025-06-05T21:12:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pki-iam-and-the-crypto-agility-trust-imperative/</loc>
		<lastmod>2025-06-05T21:13:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-chaos-rat-used-in-recent-attacks-targeting-linux/</loc>
		<lastmod>2025-06-05T21:13:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lumos-touts-albus-as-first-ai-agent-for-autonomous-identity-governance/</loc>
		<lastmod>2025-06-05T21:13:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsa-expands-passwordless-authentication-with-windows-desktop-login-and-entra-id-integration/</loc>
		<lastmod>2025-06-05T21:13:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-password-pains-to-productivity-gains-modern-access-real-results/</loc>
		<lastmod>2025-06-05T21:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-ukraine-hacks-russian-warplane-maker/</loc>
		<lastmod>2025-06-05T21:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-names-new-director-for-hipaa-enforcement-agency/</loc>
		<lastmod>2025-06-05T21:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-credential-vuln-on-aws-azure-oracle-cloud/</loc>
		<lastmod>2025-06-05T21:14:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-tightens-ai-security-with-new-tools/</loc>
		<lastmod>2025-06-05T22:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/barracuda-networks-leverages-ai-to-integrate-cybersecurity-workflows/</loc>
		<lastmod>2025-06-05T22:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-attacking-browsers-via-webgpu/</loc>
		<lastmod>2025-06-05T22:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-keynote-how-offensive-security-made-me-better-at-defense/</loc>
		<lastmod>2025-06-05T22:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-speed-paradox-securing-ai-generated-code-contrast-security/</loc>
		<lastmod>2025-06-05T22:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-versions-of-chaos-rat-target-windows-and-linux-systems/</loc>
		<lastmod>2025-06-05T22:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-badbox-2-0-android-malware-infects-millions-of-consumer-devices/</loc>
		<lastmod>2025-06-05T22:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-forensics-firm-cellebrite-to-acquire-corellium/</loc>
		<lastmod>2025-06-05T22:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pathwiper-attack-hits-critical-infrastructure-in-ukraine/</loc>
		<lastmod>2025-06-05T22:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-seizes-7-7m-from-crypto-funds-linked-to-north-koreas-it-worker-scheme/</loc>
		<lastmod>2025-06-05T23:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbefugter-zugriff-bei-einem-jobportal-in-spanien/</loc>
		<lastmod>2025-06-05T23:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-smartphones-der-polizei-von-mecklenburg-vorpommern/</loc>
		<lastmod>2025-06-05T23:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-konto-eines-tierschutzvereins-aus-deutschland-gehackt/</loc>
		<lastmod>2025-06-05T23:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-gemeinde-in-niedersachsen-deutschland/</loc>
		<lastmod>2025-06-05T23:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-lebensmittel-lieferdienst-in-indien/</loc>
		<lastmod>2025-06-05T23:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-hersteller-von-zelten-in-indiana-usa/</loc>
		<lastmod>2025-06-05T23:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-onlineshop-aus-deutschland/</loc>
		<lastmod>2025-06-05T23:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-anbieter-von-outdoor-bekleidung/</loc>
		<lastmod>2025-06-05T23:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-das-kartenzahlungssystem-eines-restaurants-in-bayern/</loc>
		<lastmod>2025-06-05T23:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/att-not-sure-if-new-customer-data-dump-is-daja-vu/</loc>
		<lastmod>2025-06-05T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-google-chromium-v8-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-06-05T23:05:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-espionage-group-caught-spying-on-kurdish-officials/</loc>
		<lastmod>2025-06-05T23:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mind-gets-30m-to-boost-ai-for-endpoint-data-loss-prevention/</loc>
		<lastmod>2025-06-05T23:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-begins-leaking-kettering-healths-stolen-data/</loc>
		<lastmod>2025-06-05T23:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secops-need-to-tackle-ai-hallucinations-to-improve-accuracy/</loc>
		<lastmod>2025-06-05T23:06:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/skybox-is-gone-the-risk-of-waiting-isnt/</loc>
		<lastmod>2025-06-06T00:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-most-exposed-secrets-never-get-fixed/</loc>
		<lastmod>2025-06-06T00:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webshops-und-retouren-ruckgabe-bestellter-ware-oft-zu-kompliziert/</loc>
		<lastmod>2025-06-06T00:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verbraucher-ja-zur-cybersicherheit-aber-desinteresse-bei-der-herkunft/</loc>
		<lastmod>2025-06-06T00:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uncle-sam-puts-10m-bounty-on-redline-dev-and-russia-backed-cronies/</loc>
		<lastmod>2025-06-06T00:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-okta-targeted-by-telephone-wielding-hackers/</loc>
		<lastmod>2025-06-06T00:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-upcoming-gemini-kingfall-is-allegedly-a-coding-beast/</loc>
		<lastmod>2025-06-06T00:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-prepares-o3-pro-model-for-200-pro-subscribers/</loc>
		<lastmod>2025-06-06T00:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-takeaways-from-the-detect-bad-intent-early-webinar-how-to-stop-fraud-before-it-starts/</loc>
		<lastmod>2025-06-06T04:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lumma-infostealer-analyse-des-takedowns/</loc>
		<lastmod>2025-06-06T04:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ship-abandoned-off-alaska-after-electric-cars-on-board-catch-fire/</loc>
		<lastmod>2025-06-06T04:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-becomes-key-player-in-enterprise-ransomware-defense/</loc>
		<lastmod>2025-06-06T05:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-june-6-2025/</loc>
		<lastmod>2025-06-06T05:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-backdoor-order-to-apple-raises-bipartisan-concerns/</loc>
		<lastmod>2025-06-06T06:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hmrc-phishing-breach-wholly-avoidable-but-hard-to-stop/</loc>
		<lastmod>2025-06-06T06:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-patient-data-starts-with-knowing-where-its-stored/</loc>
		<lastmod>2025-06-06T06:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-and-usb-attacks-are-hammering-ot-systems/</loc>
		<lastmod>2025-06-06T06:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-gruppe-stormous-v4-datendiebstahl-bei-volkswagen/</loc>
		<lastmod>2025-06-06T06:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fancy-bear-russlands-digitale-speerspitze-gegen-die-demokratie/</loc>
		<lastmod>2025-06-06T07:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-urged-to-push-vendors-for-roadmaps-on-post-quantum-cryptography-readiness/</loc>
		<lastmod>2025-06-06T07:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-iam-should-be-the-starting-point-for-ai-driven-cybersecurity/</loc>
		<lastmod>2025-06-06T07:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-roundcube-vulnerability-to-steal-user-credentials-via-xss-attack/</loc>
		<lastmod>2025-06-06T07:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-startet-european-security-program/</loc>
		<lastmod>2025-06-06T07:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3am-ransomware-sophos-warnt-vor-neuer-angriffstaktik-mit-virtuellen-maschinen/</loc>
		<lastmod>2025-06-06T07:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-prozesse-automatisieren-sieben-tipps-fur-mehr-it-sicherheit-durch-prozessorchestrierung/</loc>
		<lastmod>2025-06-06T07:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantenresistenz-jetzt-wie-it-strategen-ihre-kryptografie-zukunftssicher-machen/</loc>
		<lastmod>2025-06-06T08:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/17-million-black-market-empire-crushed-in-cybercrime-sting/</loc>
		<lastmod>2025-06-06T08:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-und-edge-notfall-updates-und-arger-in-chrome-edge-137/</loc>
		<lastmod>2025-06-06T08:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-the-eu-lead-the-global-digital-future-heres-what-the-strategy-says/</loc>
		<lastmod>2025-06-06T08:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/june-2025-patch-tuesday-forecast-second-time-is-the-charm/</loc>
		<lastmod>2025-06-06T08:08:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-chrome-extensions-leak-api-keys-user-data-via-http-and-hard-coded-credentials/</loc>
		<lastmod>2025-06-06T08:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-exploit-released-for-apache-tomcat-dos-vulnerability/</loc>
		<lastmod>2025-06-06T08:08:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privatsphare-follower-auf-kleinanzeigen-nicht-langer-geheim/</loc>
		<lastmod>2025-06-06T08:08:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/k8s-infrastructure-design-assessment-optimize-cloud-native-foundation/</loc>
		<lastmod>2025-06-06T08:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paste-ee-turned-cyber-weapon-xworm-and-asyncrat-delivered-by-malicious-actors/</loc>
		<lastmod>2025-06-06T08:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/play-ransomware-group-hit-900-organizations-since-2022/</loc>
		<lastmod>2025-06-06T09:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-report-10-ai-threat-campaigns-revealed-including-windows-based-malware-fake-resumes/</loc>
		<lastmod>2025-06-06T09:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badbox-2-0-malware-hits-over-a-million-android-devices-in-global-cyber-threat/</loc>
		<lastmod>2025-06-06T09:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omada-bringt-iga-direkt-in-microsoft-teams-mit-dem-neuen-ki-assistenten-javi/</loc>
		<lastmod>2025-06-06T09:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pathwiper-malware-targets-critical-infrastructure-to-deploy-admin-tools/</loc>
		<lastmod>2025-06-06T09:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciam-across-industries-a-journey-through-digital-identity-neighborhoods/</loc>
		<lastmod>2025-06-06T10:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrests-20-suspects-for-distributing-child-sexual-abuse-content/</loc>
		<lastmod>2025-06-06T10:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extensions-flaw-exposes-sensitive-api-keys-secrets-and-tokens/</loc>
		<lastmod>2025-06-06T10:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-rce-flaw-found-in-hpe-insight-remote-support-tool/</loc>
		<lastmod>2025-06-06T10:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-420-fake-susies-flawed-systems-and-fruity-fixes-for-anxiety/</loc>
		<lastmod>2025-06-06T10:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pathwiper-data-wiper-malware-disrupts-ukrainian-critical-infrastructure-in-2025-attack/</loc>
		<lastmod>2025-06-06T10:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-referentenentwurf-zur-nis2-umsetzung-die-nis2-umsetzung-kommt-naher/</loc>
		<lastmod>2025-06-06T10:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bladedfeline-cyber-spionage-im-schatten/</loc>
		<lastmod>2025-06-06T10:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-gesucht-usa-bieten-millionen-kopfgeld-fur-malware-entwickler/</loc>
		<lastmod>2025-06-06T10:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3am-ransomware-getarnte-cyberangriffe-mit-virtuellen-maschinen/</loc>
		<lastmod>2025-06-06T11:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-infostealer-tarnt-sich-mit-gefalschtem-captcha/</loc>
		<lastmod>2025-06-06T11:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-7-ics-advisories-targeting-critical-infrastructure-flaws/</loc>
		<lastmod>2025-06-06T11:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/145-criminal-domains-linked-to-bidencash-marketplace-seized/</loc>
		<lastmod>2025-06-06T11:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-freertos-plus-tcp-flaw-allows-code-execution-or-system-crash/</loc>
		<lastmod>2025-06-06T11:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-ai-driven-pentest-tools-2025/</loc>
		<lastmod>2025-06-06T12:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-offers-10-million-reward-for-tips-about-state-linked-redline-hackers/</loc>
		<lastmod>2025-06-06T12:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/any-run-empowers-government-agencies-with-real-time-threat-detection/</loc>
		<lastmod>2025-06-06T12:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-rce-vulnerability-in-aws-amplify-studio-poc-now-public/</loc>
		<lastmod>2025-06-06T12:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prep-for-layoffs-before-they-compromise-security/</loc>
		<lastmod>2025-06-06T12:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec2025-top-six-cyber-trends-cisos-need-to-know/</loc>
		<lastmod>2025-06-06T12:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/admin-panels-zahlreicher-wasserwerke-frei-zuganglich-im-netz/</loc>
		<lastmod>2025-06-06T12:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsstandards-fur-cloud-edge-cybersecurity-in-der-fertigungsindustrie/</loc>
		<lastmod>2025-06-06T12:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-mind-of-the-adversary-why-more-security-leaders-are-selecting-aev/</loc>
		<lastmod>2025-06-06T12:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-campaign-hijacks-clipboard-via-fake-captcha-for-malware-delivery/</loc>
		<lastmod>2025-06-06T13:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/colossal-breach-exposes-4b-chinese-user-records-in-surveillance-grade-database/</loc>
		<lastmod>2025-06-06T13:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-moves-to-claim-7-74-million-tied-to-north-korean-it-worker-scheme/</loc>
		<lastmod>2025-06-06T13:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-data-wiper-found-in-ukrainian-critical-infrastructure/</loc>
		<lastmod>2025-06-06T13:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leadership-trust-and-cyber-hygiene-ncscs-guide-to-security-culture-in-action/</loc>
		<lastmod>2025-06-06T13:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-offers-10m-bounty-for-info-on-redline-malware-creator-and-state-hackers/</loc>
		<lastmod>2025-06-06T13:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risk-protection-program-google-startet-ki-cyberversicherung-in-deutschland/</loc>
		<lastmod>2025-06-06T13:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-reasons-to-visit-ironscales-at-pax8-beyond-2025/</loc>
		<lastmod>2025-06-06T14:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-startet-neues-europaisches-sicherheitsprogramm/</loc>
		<lastmod>2025-06-06T14:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kettering-health-confirms-attack-by-interlock-ransomware-group-as-health-record-system-is-restored/</loc>
		<lastmod>2025-06-06T14:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marks-spencers-ransomware-nightmare-more-details-emerge/</loc>
		<lastmod>2025-06-06T14:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keine-150-tage-bis-support-ende-windows-10-legt-bei-marktanteilen-minimal-zu/</loc>
		<lastmod>2025-06-06T14:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uncle-sam-moves-to-seize-7-7m-laundered-by-north-korean-it-worker-ring/</loc>
		<lastmod>2025-06-06T14:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nickname-zero-click-imessage-exploit-targeted-key-figures-in-us-eu/</loc>
		<lastmod>2025-06-06T14:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-android-devices-roped-into-badbox-2-0-botnet-is-yours-among-them/</loc>
		<lastmod>2025-06-06T14:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-offers-10m-bounty-for-information-on-redline-malware-creator/</loc>
		<lastmod>2025-06-06T14:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/msft-crowdstrike-rosetta-stone-for-naming-apts-meh/</loc>
		<lastmod>2025-06-06T14:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mirai-variant-exploits-tbk-dvr-flaw-for-remote-code-execution/</loc>
		<lastmod>2025-06-06T15:06:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-european-security-effort-to-disrupt-cybercrime-networks/</loc>
		<lastmod>2025-06-06T15:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vipersoftx-malware-used-by-threat-actors-to-steal-sensitive-information/</loc>
		<lastmod>2025-06-06T15:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synthetic-data-is-here-to-stay-but-how-secure-is-it/</loc>
		<lastmod>2025-06-06T15:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empower-users-and-protect-against-genai-data-loss/</loc>
		<lastmod>2025-06-06T15:06:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-helps-cbi-dismantle-indian-call-centers-behind-japanese-tech-support-scam/</loc>
		<lastmod>2025-06-06T15:07:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-build-a-robust-windows-service-to-block-malware-and-ransomware/</loc>
		<lastmod>2025-06-06T15:07:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-hackers-target-tech-company-help-desk-administrators/</loc>
		<lastmod>2025-06-06T15:07:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-uses-tech-vendor-impersonation-and-phishing-kits-to-target-helpdesks/</loc>
		<lastmod>2025-06-06T15:07:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unlautere-geschaftspraktiken-millionenstrafen-fur-vodafone/</loc>
		<lastmod>2025-06-06T15:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-studie-zeigt-schwachen-bei-cloud-sicherheit-und-ki-abwehr-auf/</loc>
		<lastmod>2025-06-06T15:08:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-tokens-the-danger-behind-the-commvault-breach/</loc>
		<lastmod>2025-06-06T15:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feeling-relieved-with-effective-secrets-rotation/</loc>
		<lastmod>2025-06-06T15:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/budget-friendly-secrets-management-options/</loc>
		<lastmod>2025-06-06T15:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-trust-in-non-human-identity-management/</loc>
		<lastmod>2025-06-06T15:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-takes-down-chatgpt-accounts-linked-to-state-backed-hacking-disinformation/</loc>
		<lastmod>2025-06-06T15:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/optimizing-security-with-proactive-nhidr/</loc>
		<lastmod>2025-06-06T15:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/off-brand-iot-devices-are-still-vulnerable-to-badbox-botnet-fbi-says/</loc>
		<lastmod>2025-06-06T15:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strato-aktiviert-automatisch-die-dmarc-prufung-fur-mails/</loc>
		<lastmod>2025-06-06T15:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pathwiper-data-wiper-malware-hits-critical-infrastructure-in-ukraine/</loc>
		<lastmod>2025-06-06T15:05:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-flaws-now-exploited-in-qilin-ransomware-attacks/</loc>
		<lastmod>2025-06-06T15:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vendor-risk-in-saas-supply-chains-2025-guide-nudge-security/</loc>
		<lastmod>2025-06-06T16:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigeria-jails-9-chinese-nationals-for-being-part-of-international-cyberfraud-syndicate/</loc>
		<lastmod>2025-06-06T16:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-ise-cloud-deployment-static-credential-vulnerability-cve-2025-20286/</loc>
		<lastmod>2025-06-06T16:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-mature-is-your-pki-find-out-the-smart-way-with-the-pki-maturity-model/</loc>
		<lastmod>2025-06-06T16:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corporate-executives-face-mounting-digital-threats-as-ai-drives-impersonation/</loc>
		<lastmod>2025-06-06T16:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackergruppe-unc6040-greift-salesforce-instanzen-per-vishing-an/</loc>
		<lastmod>2025-06-06T16:07:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kettering-health-confirms-interlock-ransomware-behind-cyberattack/</loc>
		<lastmod>2025-06-06T16:08:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attack-uses-fake-cloudflare-verification-to-silently-deploy-malware/</loc>
		<lastmod>2025-06-06T16:08:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-reportedly-compromised-over-120-victims-in-the-past-year/</loc>
		<lastmod>2025-06-06T16:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kettering-health-confirms-interlock-ransomware-behind-cyberattack-2/</loc>
		<lastmod>2025-06-06T16:09:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-fake-ai-business-tools-spreading-hidden-ransomware/</loc>
		<lastmod>2025-06-06T16:09:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attack-uses-fake-cloudflare-verification-to-silently-deploy-malware-2/</loc>
		<lastmod>2025-06-06T16:09:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-experts-issue-best-practices-for-migrating-to-post-quantum-cryptography-and-for-improving-orgs-cyber-culture/</loc>
		<lastmod>2025-06-06T17:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/25-jahre-usb-stick-ein-praktisches-fehleranfalliges-speichermedium/</loc>
		<lastmod>2025-06-06T17:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fresh-strain-of-pro-russian-wiper-flushes-ukrainian-critical-infrastructure/</loc>
		<lastmod>2025-06-06T17:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-issues-play-ransomware-security-advisory-mitigation-steps-to-take-now/</loc>
		<lastmod>2025-06-06T17:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-leverage-new-clickfix-tactic-to-exploit-human-error-with-deceptive-prompts/</loc>
		<lastmod>2025-06-06T17:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-malicious-github-repos-targeting-novice-cybercriminals-traced-to-single-user/</loc>
		<lastmod>2025-06-06T17:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-on-the-malicious-uses-of-ai/</loc>
		<lastmod>2025-06-06T18:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-it-cant-double-our-money-were-not-building-it-intel-products-chief-says/</loc>
		<lastmod>2025-06-06T18:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec-distribution-panel-the-value-of-expertise/</loc>
		<lastmod>2025-06-06T18:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-ico-publishes-ai-and-biometrics-strategy/</loc>
		<lastmod>2025-06-06T18:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-must-translate-cyber-threats-into-business-risk/</loc>
		<lastmod>2025-06-06T18:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-shares-script-to-restore-inetpub-folder-you-shouldnt-delete/</loc>
		<lastmod>2025-06-06T18:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/</loc>
		<lastmod>2025-06-06T18:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-rust-developed-infostealer-drains-sensitive-data-from-chromium-based-browsers/</loc>
		<lastmod>2025-06-06T18:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-acquires-agentic-ai-security-startup-fletch/</loc>
		<lastmod>2025-06-06T18:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badbox-2-0-targets-home-networks-in-botnet-campaign-fbi-warns/</loc>
		<lastmod>2025-06-06T18:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-atomic-macos-stealer-campaign-exploits-clickfix-to-target-apple-users/</loc>
		<lastmod>2025-06-06T18:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/they-deepfaked-through-the-bathroom-window-how-cybercriminals-are-targeting-executives-key-personnel-at-home/</loc>
		<lastmod>2025-06-06T19:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-chrome-extensions-found-leaking-data-via-unencrypted-connections/</loc>
		<lastmod>2025-06-06T19:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-insights-with-contrast-ciso-david-lindner-06-06-25/</loc>
		<lastmod>2025-06-06T20:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-low-cost-android-devices-turn-home-networks-into-crime-platforms/</loc>
		<lastmod>2025-06-06T20:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubrik-ceo-combining-identity-and-data-security-is-our-future/</loc>
		<lastmod>2025-06-06T20:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extensions-transmit-sensitive-data-over-http-leak-api-keys/</loc>
		<lastmod>2025-06-06T20:07:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iam-firms-plot-a-tsa-fast-pass-for-frictionless-logins/</loc>
		<lastmod>2025-06-06T20:07:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/barracuda-networks-unveils-barracudaone-to-simplify-cybersecurity-for-businesses/</loc>
		<lastmod>2025-06-06T20:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fusiontek-acquires-amarok-to-strengthen-custom-software-and-data-driven-msp-capabilities/</loc>
		<lastmod>2025-06-06T20:08:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onespan-adds-nok-nok-labs-to-expand-passwordless-authentication-portfolio/</loc>
		<lastmod>2025-06-06T20:08:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tuskira-brings-ai-powered-threat-validation-to-servicenow-secops/</loc>
		<lastmod>2025-06-06T20:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cellebrite-acquires-corellium-raising-stakes-for-mobile-security-and-surveillance-tools/</loc>
		<lastmod>2025-06-06T20:08:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blackpoint-and-ukon-partner-to-help-msps-merge-cybersecurity-and-insurance/</loc>
		<lastmod>2025-06-06T20:09:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inadequate-experience-planned-cyber-spending-cuts-hurled-at-trumps-national-cyber-director-pick/</loc>
		<lastmod>2025-06-06T20:09:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discontinuation-of-cisas-mobile-app-security-program-untimely-lawmaker-says/</loc>
		<lastmod>2025-06-06T20:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/immediate-equipment-flaw-remediation-conducted-by-water-utilities-study-finds/</loc>
		<lastmod>2025-06-06T20:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/misconfiguration-exposes-data-from-over-3-6m-passion-io-users-creators/</loc>
		<lastmod>2025-06-06T20:09:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-4b-user-records-compromised-in-largest-chinese-data-leak-yet/</loc>
		<lastmod>2025-06-06T20:10:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bogus-cloudflare-turnstile-leveraged-in-new-clickfix-style-intrusion/</loc>
		<lastmod>2025-06-06T20:10:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-sophisticated-vipersoftx-malware-variant-emerges/</loc>
		<lastmod>2025-06-06T20:10:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-alleged-to-have-targeted-china-with-us-backing/</loc>
		<lastmod>2025-06-06T20:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/expanding-bitter-apt-operation-exposed/</loc>
		<lastmod>2025-06-06T20:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-year-cyberespionage-campaign-launched-by-bladedfeline-apt/</loc>
		<lastmod>2025-06-06T20:11:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-badbox-2-0-malware-victimization-widespread/</loc>
		<lastmod>2025-06-06T20:11:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-7-7m-in-crypto-sequestered-from-north-korean-it-worker-scam/</loc>
		<lastmod>2025-06-06T20:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-puts-up-10m-bounty-for-redline-malware-hackers/</loc>
		<lastmod>2025-06-06T20:11:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/liongard-acquires-darklight-to-expand-ai-driven-vulnerability-prioritization-for-msps/</loc>
		<lastmod>2025-06-06T20:11:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-driven-identity-leadership-saviynt-field-cto-david-lee/</loc>
		<lastmod>2025-06-06T20:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-iam-pam-managed-services-are-now-business-essentials-idm-express-founder-amit-masand/</loc>
		<lastmod>2025-06-06T20:12:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onespan-acquires-nok-nok-labs-to-expand-fido-based-passwordless-authentication/</loc>
		<lastmod>2025-06-06T20:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-management-in-its-totality-axoniusx-ceo-amir-ofek/</loc>
		<lastmod>2025-06-06T20:12:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clientless-ztna-promises-to-take-teams-beyond-the-vpn/</loc>
		<lastmod>2025-06-06T20:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/0-click-exploitation-of-imessage-nickname-feature-revealed/</loc>
		<lastmod>2025-06-06T20:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-beautiful-bill-could-bring-new-challenges-for-ai-security-pros/</loc>
		<lastmod>2025-06-06T20:13:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-ai-agent-identities-crucial-to-enterprises-says-research-firm/</loc>
		<lastmod>2025-06-06T20:13:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diliko-launches-partner-program-to-help-service-providers-deliver-ai-data-solutions-without-infrastructure-burden/</loc>
		<lastmod>2025-06-06T20:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-threat-actors-targets-ukraine-with-pathwiper-wiper/</loc>
		<lastmod>2025-06-06T20:13:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-infosecurity-europe-conference-2025-wrap-up/</loc>
		<lastmod>2025-06-06T20:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-are-hiding-malicious-web-traffic-in-plain-sight/</loc>
		<lastmod>2025-06-06T20:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secops-teams-need-to-tackle-ai-hallucinations-to-improve-accuracy/</loc>
		<lastmod>2025-06-06T20:14:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-lawmakers-say-italy-used-spyware-to-target-phones-of-immigration-activists-but-not-against-journalist/</loc>
		<lastmod>2025-06-06T21:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-used-for-evil-fake-it-worker-resumes-misinfo-and-cyber-op-assist/</loc>
		<lastmod>2025-06-06T21:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-generic-chatbots-rise-of-industry-specific-ai-agents/</loc>
		<lastmod>2025-06-06T21:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cutting-edge-clickfix-tactics-snowball-pushing-phishing-forward/</loc>
		<lastmod>2025-06-06T21:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docuseries-explores-mental-physical-hardships-of-cisos/</loc>
		<lastmod>2025-06-06T21:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyzing-the-impact-of-microtransactions-on-network-performance/</loc>
		<lastmod>2025-06-06T22:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-appoints-a-national-security-expert-to-its-governing-trust/</loc>
		<lastmod>2025-06-06T22:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industry-reacts-to-duckdbs-radical-rethink-of-lakehouse-architecture/</loc>
		<lastmod>2025-06-06T22:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sleep-center-worker-installed-secret-camera-in-bathrooms/</loc>
		<lastmod>2025-06-06T22:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/there-will-be-pain-cisa-cuts-spark-bipartisan-concerns/</loc>
		<lastmod>2025-06-06T22:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ensuring-certainty-in-nhis-lifecycle-management-2/</loc>
		<lastmod>2025-06-06T23:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-cloud-nhis-truly-protected/</loc>
		<lastmod>2025-06-06T23:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-securing-nhis-reduces-your-cyber-risk/</loc>
		<lastmod>2025-06-06T23:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unleashing-powerful-cloud-native-security-techniques/</loc>
		<lastmod>2025-06-06T23:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm04-data-model-poisoning-firetail-blog/</loc>
		<lastmod>2025-06-06T23:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-cyber-executive-order-takes-aim-at-prior-orders-secure-software-more/</loc>
		<lastmod>2025-06-06T23:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strom-grundversorgung-dsk-schafft-rechtssicherheit-zur-ubermittlung-von-mieterdaten/</loc>
		<lastmod>2025-06-06T23:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-prepares-for-transnational-cyberattacks/</loc>
		<lastmod>2025-06-06T23:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-scraps-biden-software-security-ai-post-quantum-encryption-efforts-in-new-executive-order/</loc>
		<lastmod>2025-06-07T00:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verbraucherzentrale-nrw-erste-hilfe-bei-datendiebstahl-und-geldverlust/</loc>
		<lastmod>2025-06-07T00:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-fortinet-flaws-to-deploy-qilin-ransomware/</loc>
		<lastmod>2025-06-07T00:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-supreme-court-grants-doge-unfettered-access-to-ssa-systems/</loc>
		<lastmod>2025-06-07T00:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-2025-the-trends-defining-risk-and-how-to-stay-ahead/</loc>
		<lastmod>2025-06-07T04:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-wearable-health-tech-real-time-insights-for-preventive-care/</loc>
		<lastmod>2025-06-07T04:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-boomt-die-sicherheitsrisiken-auch/</loc>
		<lastmod>2025-06-07T04:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta397s-global-targeting-tactics-reveal-indian-state-backed-cyber-operations/</loc>
		<lastmod>2025-06-07T04:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-phishing-alert-sophisticated-campaign-targets-armenian-civil-society-government/</loc>
		<lastmod>2025-06-07T04:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-its-data-was-wiped-kiranapros-co-founder-cannot-rule-out-an-external-hack/</loc>
		<lastmod>2025-06-07T04:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-saas-blind-spots-that-undermine-hipaa-security-safeguards/</loc>
		<lastmod>2025-06-07T06:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-dark-webs-currency-of-choice-stolen-data/</loc>
		<lastmod>2025-06-07T07:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-ein-college-in-idaho-usa/</loc>
		<lastmod>2025-06-07T08:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-ein-gesundheitssystem-in-maine-usa/</loc>
		<lastmod>2025-06-07T08:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-bei-einer-stadtverwaltung-in-oklahoma-usa/</loc>
		<lastmod>2025-06-07T08:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-geflugelproduzent-in-malaysia/</loc>
		<lastmod>2025-06-07T08:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warnt-millionen-android-gerate-durch-badbox-2-0-malware-infiziert/</loc>
		<lastmod>2025-06-07T09:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manage-it-techtalk-das-hat-die-kunstliche-intelligenz-mit-der-cybersecurity-zu-tun/</loc>
		<lastmod>2025-06-07T10:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/broadcom-sends-vmware-to-record-revenue-margins-as-most-big-customers-sign-for-private-cloud-bundles/</loc>
		<lastmod>2025-06-07T10:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-mystery-of-iphone-crashes-that-apple-denies-are-linked-to-chinese-hacking/</loc>
		<lastmod>2025-06-07T11:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-can-spew-code-but-kids-should-still-suffer-like-we-did-says-raspberry-pi/</loc>
		<lastmod>2025-06-07T13:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-broker-warum-der-datenhandel-trotz-dsgvo-floriert/</loc>
		<lastmod>2025-06-07T13:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/avoid-fedramp-delays-7-common-ssp-mistakes-to-fix/</loc>
		<lastmod>2025-06-07T15:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-model-context-protocol-and-its-critical-vulnerabilities/</loc>
		<lastmod>2025-06-07T16:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-challenges-data-center-managers-must-overcome-in-2025/</loc>
		<lastmod>2025-06-07T16:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elon-musk-pukes-over-pork-filled-budget-bill-with-tesla-subsidies-on-the-line/</loc>
		<lastmod>2025-06-07T16:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-badbox-2-0-botnet-surge-in-chinese-devices/</loc>
		<lastmod>2025-06-07T16:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-no-signal-no-security-dynamic-baseband-vulnerability-research/</loc>
		<lastmod>2025-06-07T18:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-20-malicious-apps-on-google-play-target-users-for-seed-phrases/</loc>
		<lastmod>2025-06-07T19:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-found-4-billion-user-records-online-the-largest-known-leak-of-chinese-personal-data-from-a-single-source/</loc>
		<lastmod>2025-06-07T19:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-npm-utilities-remotely-delete-entire-app-directories/</loc>
		<lastmod>2025-06-07T20:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-rewrites-cybersecurity-policy-in-executive-order/</loc>
		<lastmod>2025-06-07T20:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-hits-gluestack-npm-packages-with-960k-weekly-downloads/</loc>
		<lastmod>2025-06-07T20:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-posing-as-utilities-delete-project-directories/</loc>
		<lastmod>2025-06-07T20:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-takes-aim-at-biden-and-obama-cybersecurity-rules/</loc>
		<lastmod>2025-06-07T21:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empower-your-team-with-robust-nhi-protocols/</loc>
		<lastmod>2025-06-07T23:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boost-your-confidence-with-strong-nhi-management/</loc>
		<lastmod>2025-06-07T23:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scalable-solutions-for-nhi-management/</loc>
		<lastmod>2025-06-07T23:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jahrlich-droht-die-ransomware-eco-fordert-konsequente-cyberresilienz-strategien/</loc>
		<lastmod>2025-06-07T23:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundeslagebild-cybercrime-2024-bka-meldet-zahlreiche-ermittlungserfolge-bei-anhaltend-hoher-bedrohungslage/</loc>
		<lastmod>2025-06-07T23:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/14-oktober-2025-support-ende-fur-windows-10-und-weitere-software/</loc>
		<lastmod>2025-06-07T23:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edge-entwicklungsplane-pdf-ubersetzungen-und-ki-suche-im-verlauf-wirft-dsgvo-fragen-auf/</loc>
		<lastmod>2025-06-07T23:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bladedfeline-cyberspionage-im-nahen-osten/</loc>
		<lastmod>2025-06-08T04:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-stackstorm-to-deeptempo/</loc>
		<lastmod>2025-06-08T06:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schneier-tries-to-rip-the-rose-colored-ai-glasses-from-the-eyes-of-congress/</loc>
		<lastmod>2025-06-08T08:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/designproblem-erlaubt-aushebeln-von-gruppenrichtlinien/</loc>
		<lastmod>2025-06-08T08:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-google-fixes-exploited-chrome-zero-day-patch-tuesday-forecast/</loc>
		<lastmod>2025-06-08T09:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-eu-os-hoffentlich-wirds-bald/</loc>
		<lastmod>2025-06-08T09:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-foundation-tries-to-play-peacemaker-in-ongoing-wordpress-scuffle/</loc>
		<lastmod>2025-06-08T10:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-browser-extensions-infect-722-users-across-latin-america-since-early-2025/</loc>
		<lastmod>2025-06-08T10:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-security-sorge-im-weisen-haus-wegen-starlink-zugang/</loc>
		<lastmod>2025-06-08T11:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-turn-to-residential-proxy-services-to-hide-malicious-traffic/</loc>
		<lastmod>2025-06-08T12:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-quarterbacks-to-cxos-why-we-all-need-a-coach/</loc>
		<lastmod>2025-06-08T13:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-48/</loc>
		<lastmod>2025-06-08T13:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-527-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-06-08T13:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-ist-eine-frage-nationaler-souveranitat/</loc>
		<lastmod>2025-06-08T13:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-die-webseite-eines-magazins-in-spanien/</loc>
		<lastmod>2025-06-08T14:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-kirche-in-deutschland/</loc>
		<lastmod>2025-06-08T14:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-erweitert-sein-portfolio-um-2-neue-zero-trust-losungen/</loc>
		<lastmod>2025-06-08T14:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-ist-teil-unserer-digitalen-selbstbestimmung/</loc>
		<lastmod>2025-06-08T14:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-950k-weekly-downloads-at-risk-in-ongoing-supply-chain-attack-on-gluestack-packages/</loc>
		<lastmod>2025-06-08T15:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-supply-chain-malware-operation-hits-npm-and-pypi-ecosystems-targeting-millions-globally/</loc>
		<lastmod>2025-06-08T15:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-browser-extensions-infect-over-700-users-across-latin-america-since-early-2025/</loc>
		<lastmod>2025-06-08T15:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mirai-botnet-infect-tbk-dvr-devices-via-command-injection-flaw/</loc>
		<lastmod>2025-06-08T16:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-found-in-npm-packages-with-1-million-weekly-downloads/</loc>
		<lastmod>2025-06-08T17:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-cyber-executive-order-takes-aim-at-prior-orders-secure-software-identity/</loc>
		<lastmod>2025-06-08T18:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geheimnisvoller-hacker-deckt-cyberkriminelle-auf-warum-er-auf-millionen-verzichtet/</loc>
		<lastmod>2025-06-08T21:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-using-fake-it-support-calls-to-breach-corporate-systems-google/</loc>
		<lastmod>2025-06-08T22:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rasante-zunahme-des-cookie-diebstahls-die-suse-versuchung-fur-hacker/</loc>
		<lastmod>2025-06-08T23:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wlan-auf-reisen-jeder-siebte-urlauber-gefahrdet-eigene-datensicherheit/</loc>
		<lastmod>2025-06-08T23:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-identitatsbetrug-bedroht-unternehmenssicherheit/</loc>
		<lastmod>2025-06-08T23:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-cybergruppe-fur-angriffe-auf-britische-handler-und-mehr-verantwortlich/</loc>
		<lastmod>2025-06-08T23:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/confidence-in-handling-nhis-effectively/</loc>
		<lastmod>2025-06-09T04:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stay-reassured-with-enhanced-nhi-safety/</loc>
		<lastmod>2025-06-09T04:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proactive-measures-for-nhi-threat-detection/</loc>
		<lastmod>2025-06-09T04:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensivecon25-skin-in-the-game-survival-of-gpu-iommu-irregular-damage/</loc>
		<lastmod>2025-06-09T04:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc1151-exploits-roundcube-flaw-in-spear-phishing-attack/</loc>
		<lastmod>2025-06-09T04:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-asteroidcomet-hunter-probe-unfurls-a-solar-wing/</loc>
		<lastmod>2025-06-09T04:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-siems-miss-79-of-known-mitre-attck-techniques/</loc>
		<lastmod>2025-06-09T05:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/employees-repeatedly-fall-for-vendor-email-compromise-attacks/</loc>
		<lastmod>2025-06-09T05:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-are-you-ready-for-cyber-threats-in-biotech/</loc>
		<lastmod>2025-06-09T06:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fiddleitm-open-source-mitmproxy-add-on-identifies-malicious-web-traffic/</loc>
		<lastmod>2025-06-09T06:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-fur-cyberangriff-verwendet-zwei-kritische-schwachstellen-in-foren-plattform-vbulletin/</loc>
		<lastmod>2025-06-09T06:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/do-you-really-need-a-real-id-to-fly-in-the-us-breaking-down-the-myths/</loc>
		<lastmod>2025-06-09T07:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zolltricks-und-tariftauschung-wie-online-betruger-das-handelschaos-fur-sich-nutzen/</loc>
		<lastmod>2025-06-09T07:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-41-threat-intelligence-report-and-malware-analysis/</loc>
		<lastmod>2025-06-09T07:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/physischer-cyberangriff-auf-eine-feuerwehr-in-berlin/</loc>
		<lastmod>2025-06-09T07:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/balancing-cybersecurity-and-client-experience-for-highworth-clients/</loc>
		<lastmod>2025-06-09T07:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-gpt-revolutionizing-penetration-testing-with-ai-on-kali-linux/</loc>
		<lastmod>2025-06-09T07:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimsuky-strikes-again-coordinated-attacks-target-facebook-email-and-telegram/</loc>
		<lastmod>2025-06-09T07:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erp-cloudmigration-am-beispiel-von-sap-s-4hana-sichere-umstellung-auf-cloud-erp/</loc>
		<lastmod>2025-06-09T07:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-20-malicious-crypto-wallet-apps-found-on-google-play-cril-warns/</loc>
		<lastmod>2025-06-09T08:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-bans-chatgpt-accounts-used-by-russian-iranian-and-chinese-hacker-groups/</loc>
		<lastmod>2025-06-09T08:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/futures-report-2025-von-levelblue-unternehmen-unterschatzen-risiken-durch-ki-angriffe/</loc>
		<lastmod>2025-06-09T08:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-mssps-must-prioritize-cyber-risk-quantification-in-2025/</loc>
		<lastmod>2025-06-09T09:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badbox-2-0-botnet-infects-millions-of-iot-devices-worldwide-fbi-warns/</loc>
		<lastmod>2025-06-09T09:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-cisa-and-partners-face-budget-overhauls-cuts/</loc>
		<lastmod>2025-06-09T09:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-utility-packages-enable-attackers-to-wipe-production-systems/</loc>
		<lastmod>2025-06-09T09:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hellotds-malware-spread-via-fakecaptcha-infrastructure-infects-millions-of-devices/</loc>
		<lastmod>2025-06-09T09:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-salesforce-vulnerability-exposes-global-users-to-soql-injection-attacks/</loc>
		<lastmod>2025-06-09T09:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-the-evolving-malware-and-ransomware-threat-landscape/</loc>
		<lastmod>2025-06-09T10:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-assets-have-115-vulnerabilities-on-average-some-several-years-old/</loc>
		<lastmod>2025-06-09T10:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mirai-botnet-targets-tbk-dvrs-by-exploiting-cve-2024-3721/</loc>
		<lastmod>2025-06-09T10:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-for-developers-16-react-native-packages-with-millions-of-downloads-compromised-overnight/</loc>
		<lastmod>2025-06-09T10:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-naval-operations-accidentally-jam-new-zealands-internet-and-radio/</loc>
		<lastmod>2025-06-09T10:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-tries-to-claw-back-7m-taken-by-north-korean-it-workers/</loc>
		<lastmod>2025-06-09T10:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-smart-home-users-of-badbox-2-0-botnet-threat/</loc>
		<lastmod>2025-06-09T10:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-pragmatischer-ansatz-bereit-sein-furs-worst-case-szenario-bei-sensiblen-datenlecks/</loc>
		<lastmod>2025-06-09T10:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-rebuffs-china-linked-attack-and-discovers-global-intrusions/</loc>
		<lastmod>2025-06-09T11:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-reposition-their-roles-for-business-leadership/</loc>
		<lastmod>2025-06-09T11:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-spy-crew-appears-to-be-preparing-for-conflict-by-backdooring-75-critical-orgs/</loc>
		<lastmod>2025-06-09T11:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pathwiper-malware-strikes-ukraines-critical-infrastructure/</loc>
		<lastmod>2025-06-09T11:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jenkins-gatling-plugin-flaw-allows-csp-bypass-exposing-systems-to-attack/</loc>
		<lastmod>2025-06-09T11:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-gpt-revolutionizing-penetration-testing-with-ai-on-kali-linux-2/</loc>
		<lastmod>2025-06-09T11:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentar-von-dr-christoph-bausewein-crowdstrike-kunstliche-intelligenz-und-cybersicherheit-entwicklungen-2025-zur-abwehr-von-cyberbedrohungen/</loc>
		<lastmod>2025-06-09T11:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unmasking-the-silent-saboteur-you-didnt-know-was-running-the-show/</loc>
		<lastmod>2025-06-09T12:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unverified-code-is-the-next-national-security-threat/</loc>
		<lastmod>2025-06-09T12:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-qnap-flaws-allow-remote-attackers-to-hijack-user-accounts/</loc>
		<lastmod>2025-06-09T12:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-duplexspy-rat-gives-attackers-full-control-over-windows-machines/</loc>
		<lastmod>2025-06-09T12:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-revises-cybersecurity-rules-replaces-biden-and-obama-orders/</loc>
		<lastmod>2025-06-09T12:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seraphic-security-unveils-browsertotal-free-ai-powered-browser-security-assessment-for-enterprises/</loc>
		<lastmod>2025-06-09T13:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsa-extends-reach-of-passwordless-management-platform/</loc>
		<lastmod>2025-06-09T13:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contrast-security-combines-graph-and-ai-technologies-to-secure-applications/</loc>
		<lastmod>2025-06-09T13:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-new-in-codesentry-7-2/</loc>
		<lastmod>2025-06-09T13:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zealand-government-mandates-dmarc-under-new-secure-email-framework/</loc>
		<lastmod>2025-06-09T13:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhs-calls-for-1-million-blood-donors-as-uk-stocks-remain-low-following-cyberattack/</loc>
		<lastmod>2025-06-09T13:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seraphic-security-unveils-browsertotal-free-ai-powered-browser-security-assessment-for-enterprises-2/</loc>
		<lastmod>2025-06-09T13:04:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 3b03e86bac9b59d2fa93b603aaee621a; Queries for sitemap: 3; Total queries: 88; Seconds: 4.74; Memory for sitemap: 1KB; Total memory: 60MB -->
