<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='19. April 2026 19:55 pm' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/bleach-wasnt-strong-enough-clorox-sues-cognizant-after-help-desk-allegedly-gave-away-passwords-to-hackers/</loc>
		<lastmod>2025-07-25T08:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xonplus-launches-real-time-breach-alerting-platform-for-enterprise-credential-exposure/</loc>
		<lastmod>2025-07-25T08:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-books-shaping-todays-cybersecurity-leaders/</loc>
		<lastmod>2025-07-25T08:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xonplus-launches-real-time-breach-alerting-platform-for-enterprise-credential-exposure-2/</loc>
		<lastmod>2025-07-25T08:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-hacker-groups-exploit-sharepoint-0-day-vulnerability-in-the-wild/</loc>
		<lastmod>2025-07-25T08:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-ki-entwickelt-neue-linux-malware-versteckt-sich-in-susen-panda-bildchen/</loc>
		<lastmod>2025-07-25T08:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xonplus-launches-real-time-breach-alerting-platform-for-enterprise-credential-exposure-3/</loc>
		<lastmod>2025-07-25T08:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mitel-patches-critical-mivoice-mx-one-auth-bypass-flaw/</loc>
		<lastmod>2025-07-25T09:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-campaign-uses-youtube-and-discord-to-harvest-credentials-from-computers/</loc>
		<lastmod>2025-07-25T09:35:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-castleloader-attack-uses-cloudflare-themed-clickfix-method-to-compromise-windows-systems/</loc>
		<lastmod>2025-07-25T09:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-voip-botnet-targets-routers-using-default-passwords/</loc>
		<lastmod>2025-07-25T09:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-datenzugangsrechte-wie-man-sich-auf-den-eu-data-act-vorbereitet/</loc>
		<lastmod>2025-07-25T09:35:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brave-browser-blockiert-microsoft-recall-auf-tabs/</loc>
		<lastmod>2025-07-25T10:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advisor-to-brit-tech-contractors-qdos-confirms-client-data-leak/</loc>
		<lastmod>2025-07-25T10:35:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-lifts-windows-11-update-block-for-easy-anti-cheat-users/</loc>
		<lastmod>2025-07-25T10:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tridium-niagara-framework-flaws-expose-sensitive-network-data/</loc>
		<lastmod>2025-07-25T10:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vgauth-flaw-in-vmware-tools-grants-full-system-access/</loc>
		<lastmod>2025-07-25T10:35:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chaos-ransomware-emerges-launches-wave-of-attacks/</loc>
		<lastmod>2025-07-25T10:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentar-von-shachar-menashe-jfrog-wie-shadow-ml-die-sicherheit-der-software-gefahrdet/</loc>
		<lastmod>2025-07-25T10:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksuit-ransomware-gangs-darknet-websites-seized-by-police/</loc>
		<lastmod>2025-07-25T11:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/koske-a-new-ai-generated-linux-malware-appears-in-the-threat-landscape/</loc>
		<lastmod>2025-07-25T11:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-it-freelancer-betreiberin-von-nordkorea-laptopfarm-muss-85-jahre-in-haft/</loc>
		<lastmod>2025-07-25T11:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-announces-15m-reward-for-north-korean-it-scheme-leaders/</loc>
		<lastmod>2025-07-25T11:41:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soco404-and-koske-malware-target-cloud-services-with-cross-platform-cryptomining-attacks/</loc>
		<lastmod>2025-07-25T11:41:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overcoming-risks-from-chinese-genai-tool-usage/</loc>
		<lastmod>2025-07-25T11:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcttp-2025-save-the-date-fur-taktik-technik-und-teamwork/</loc>
		<lastmod>2025-07-25T11:41:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/klage-gegen-it-helpdesk-hacker-sollen-einfach-nach-passwort-gefragt-haben/</loc>
		<lastmod>2025-07-25T11:41:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwicklerdaten-gefahrdet-hacker-schleust-loschbefehl-in-ki-tool-amazons-ein/</loc>
		<lastmod>2025-07-25T11:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lup-kliniken-patientendaten-nach-cyberangriff-im-darknet-entdeckt/</loc>
		<lastmod>2025-07-25T11:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksuit-ransomware-gangs-darknet-websites-seized-by-police-2/</loc>
		<lastmod>2025-07-25T12:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-cambridge-consultants-ceo-monty-barlow-scans-for-tech-surprises/</loc>
		<lastmod>2025-07-25T12:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/woman-gets-8-years-for-aiding-north-koreans-infiltrate-300-us-firms/</loc>
		<lastmod>2025-07-25T12:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-attack-spoofs-facebook-login-page-to-capture-credentials/</loc>
		<lastmod>2025-07-25T12:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-announces-15m-reward-for-north-korean-it-scheme-leaders-2/</loc>
		<lastmod>2025-07-25T12:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soco404-and-koske-malware-target-cloud-services-with-cross-platform-cryptomining-attacks-2/</loc>
		<lastmod>2025-07-25T12:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overcoming-risks-from-chinese-genai-tool-usage-2/</loc>
		<lastmod>2025-07-25T12:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prolonged-chinese-cyber-espionage-campaign-targets-vmware-appliances/</loc>
		<lastmod>2025-07-25T12:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcttp-2025-save-the-date-fur-taktik-technik-und-teamwork-2/</loc>
		<lastmod>2025-07-25T12:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iga-verbessert-neben-der-digitalen-resilienz-auch-die-versicherungskonditionen/</loc>
		<lastmod>2025-07-25T12:37:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-im-spannungsfeld-zwischen-fortschritt-und-risiko/</loc>
		<lastmod>2025-07-25T12:38:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysadmin-day-die-verstorbene-funkmaus-und-andere-admin-geschichten/</loc>
		<lastmod>2025-07-25T12:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/klage-gegen-it-helpdesk-hacker-sollen-einfach-nach-passwort-gefragt-haben-2/</loc>
		<lastmod>2025-07-25T12:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-it-freelancer-betreiberin-von-nordkorea-laptopfarm-muss-85-jahre-in-haft-2/</loc>
		<lastmod>2025-07-25T12:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwicklerdaten-gefahrdet-hacker-schleust-loschbefehl-in-ki-tool-amazons-ein-2/</loc>
		<lastmod>2025-07-25T12:38:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-forged-panda-images-hide-persistent-cryptomining-malware-koske/</loc>
		<lastmod>2025-07-25T13:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwarzmarkthandler-wollen-mit-bots-an-tickets-kommen/</loc>
		<lastmod>2025-07-25T13:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arizona-woman-sentenced-to-8-5-years-for-running-north-korean-laptop-farm/</loc>
		<lastmod>2025-07-25T13:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-admits-it-cannot-guarantee-data-sovereignty/</loc>
		<lastmod>2025-07-25T13:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-billion-dollars-worth-of-nvidia-chips-fell-off-a-truck-and-found-their-way-to-china-report-says/</loc>
		<lastmod>2025-07-25T13:36:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-north-korean-firm-nationals-behind-it-worker-schemes/</loc>
		<lastmod>2025-07-25T13:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fire-ant-hackers-target-vmware-esxi-and-vcenter-flaws-to-infiltrate-organizations/</loc>
		<lastmod>2025-07-25T13:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-google-forms-to-trick-victims-into-stealing-cryptocurrency/</loc>
		<lastmod>2025-07-25T13:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-indian-banking-apps-on-android-steal-login-credentials-from-users/</loc>
		<lastmod>2025-07-25T13:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-young-and-the-restless-young-cybercriminals-raise-concerns/</loc>
		<lastmod>2025-07-25T13:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-security-culture-be-taught-aws-says-yes/</loc>
		<lastmod>2025-07-25T13:38:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-angriffe-konnen-auch-secure-email-gateways-umgehen/</loc>
		<lastmod>2025-07-25T13:38:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-woman-sentenced-to-8-5-years-for-role-in-north-korean-worker-scam/</loc>
		<lastmod>2025-07-25T14:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-added-prompt-to-amazon-q-to-erase-files-and-cloud-data/</loc>
		<lastmod>2025-07-25T14:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-security-nudges-took-off/</loc>
		<lastmod>2025-07-25T14:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-espionage-campaign-hits-russian-aerospace-sector-using-eaglet-backdoor/</loc>
		<lastmod>2025-07-25T14:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empfehlungen-von-athene-so-integrieren-sie-die-cra-anforderungen-in-ihre-secdevops-prozesse/</loc>
		<lastmod>2025-07-25T14:35:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/despite-changes-crisis-pregnancy-centers-still-attract-scrutiny-over-hipaa-promises/</loc>
		<lastmod>2025-07-25T14:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-offers-15-million-reward-for-info-on-north-korean-nationals-involved-in-global-criminal-network/</loc>
		<lastmod>2025-07-25T15:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freelance-dev-shop-toptal-caught-serving-malware-after-github-account-break-in/</loc>
		<lastmod>2025-07-25T15:35:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gunra-ransomware-targets-windows-systems-encrypts-files-and-erases-shadow-copies/</loc>
		<lastmod>2025-07-25T15:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-weaponized-hta-files-to-infect-victims-with-red-ransomware/</loc>
		<lastmod>2025-07-25T15:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-sanctions-firm-behind-n-korean-it-scheme-arizona-woman-jailed-for-running-laptop-farm/</loc>
		<lastmod>2025-07-25T15:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patchwork-targets-turkish-defense-firms-with-spear-phishing-using-malicious-lnk-files/</loc>
		<lastmod>2025-07-25T15:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksuit-ransomware-groups-dark-web-sites-seized-in-operation-checkmate/</loc>
		<lastmod>2025-07-25T15:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abnormal-ai-seeks-to-widen-channel-base/</loc>
		<lastmod>2025-07-25T16:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-of-fake-error-pages-deploying-platform-specific-malware-on-linux-and-windows-systems/</loc>
		<lastmod>2025-07-25T16:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kinderschutz-altersabfrage-fur-porno-websites-in-grosbritannien-pflicht/</loc>
		<lastmod>2025-07-25T16:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-sanctions-north-koreans-involved-in-it-worker-schemes/</loc>
		<lastmod>2025-07-25T16:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attacks-on-open-source-software-are-getting-out-of-hand/</loc>
		<lastmod>2025-07-25T16:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/methods-to-bypass-otp-in-mobile-apps-successful-vapt-scenarios/</loc>
		<lastmod>2025-07-25T16:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kontroverse-ki-suche-browser-anbieter-brave-blockiert-recall-von-haus-aus/</loc>
		<lastmod>2025-07-25T16:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intruder-open-sources-tool-for-testing-api-security/</loc>
		<lastmod>2025-07-25T17:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/philadelphia-indemnity-insurance-discloses-june-data-breach/</loc>
		<lastmod>2025-07-25T17:35:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-took-a-month-to-shut-down-catwatchful-a-phone-spyware-operation-hosted-on-its-servers/</loc>
		<lastmod>2025-07-25T17:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nascar-confirms-medusa-ransomware-breach-after-4m-demand/</loc>
		<lastmod>2025-07-25T17:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-the-cybersecurity-pm-in-incident-driven-development/</loc>
		<lastmod>2025-07-25T17:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-china-linked-sharepoint-exploits-raise-alarm/</loc>
		<lastmod>2025-07-25T19:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chromes-ai-challenger-has-landed-meet-comet/</loc>
		<lastmod>2025-07-25T19:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-investigates-outage-affecting-microsoft-365-admin-center/</loc>
		<lastmod>2025-07-25T19:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-generated-linux-miner-koske-beats-human-malware/</loc>
		<lastmod>2025-07-25T19:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-it-worker-rampage-continues-amid-doj-action/</loc>
		<lastmod>2025-07-25T19:35:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senator-to-google-give-us-info-from-telco-salt-typhoon-probes/</loc>
		<lastmod>2025-07-25T20:35:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-owned-github-open-source-needs-funding-ya-think/</loc>
		<lastmod>2025-07-25T20:35:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50-years-ago-gates-and-allen-made-the-deal-that-launched-microsoft/</loc>
		<lastmod>2025-07-25T20:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-checkmate-blacksuit-ransomwares-dark-web-domains-seized/</loc>
		<lastmod>2025-07-25T20:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-exploiting-vmware-vsphere/</loc>
		<lastmod>2025-07-25T20:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-online-safety-act-is-the-day-of-reckoning-for-adult-websites-a-wake-up-call-for-games-and-xr-studios/</loc>
		<lastmod>2025-07-25T20:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fire-ant-cyber-spies-compromise-siloed-vmware-systems/</loc>
		<lastmod>2025-07-25T20:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nascar-confirms-data-breach-after-march-cyberattack/</loc>
		<lastmod>2025-07-25T21:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/</loc>
		<lastmod>2025-07-25T21:35:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-career-opportunities-weighing-certifications-vs-degrees/</loc>
		<lastmod>2025-07-25T21:35:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-ran-us-based-laptop-farm-from-arizona-womans-home/</loc>
		<lastmod>2025-07-25T22:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-resilienz-erfordert-auch-esicherheit-bewerbungsphase-fur-bsi-hall-of-fame-lauft/</loc>
		<lastmod>2025-07-25T22:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachforums-resurfaces-on-original-dark-web-onion-address/</loc>
		<lastmod>2025-07-25T22:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-flaw-in-eol-lg-lnv5110r-cameras-lets-hackers-gain-admin-access/</loc>
		<lastmod>2025-07-25T22:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patients-still-struggle-with-full-access-to-health-info/</loc>
		<lastmod>2025-07-25T22:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-torq-is-rewiring-socs-with-autonomous-cyber-agents/</loc>
		<lastmod>2025-07-25T22:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-york-unveils-nation-leading-water-sector-cyber-rules/</loc>
		<lastmod>2025-07-25T22:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poisonseed-fido-attack-turns-out-to-be-a-red-herring/</loc>
		<lastmod>2025-07-25T22:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/e-rechnungsstrategien-fallstricke-und-auswege/</loc>
		<lastmod>2025-07-25T23:35:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware/</loc>
		<lastmod>2025-07-25T23:35:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-blacksuit-is-taken-down-new-ransomware-group-chaos-emerges/</loc>
		<lastmod>2025-07-26T03:35:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-deception-maturity-model-where-does-your-organization-stand/</loc>
		<lastmod>2025-07-26T03:35:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-patches-three-critical-vulnerabilities-here-are-the-products-affected/</loc>
		<lastmod>2025-07-26T03:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-confirms-security-breach-by-extortion-group-calls-stolen-data-fake/</loc>
		<lastmod>2025-07-26T03:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/e-mails-wie-ein-einziger-klick-geschaftliche-risiken-in-die-hohe-treiben-kann/</loc>
		<lastmod>2025-07-26T04:35:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-untersucht-ob-sharepoint-0-day-vorab-an-hacker-geleakt-wurde/</loc>
		<lastmod>2025-07-26T06:35:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-dark-phone-murder-by-text-this-jaw-dropping-tale-of-how-police-hacked-gangs-is-like-the-wire/</loc>
		<lastmod>2025-07-26T06:35:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-warnt-vor-neuer-variante-des-lumma-stealers/</loc>
		<lastmod>2025-07-26T08:35:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arizona-woman-sentenced-for-aiding-north-korean-it-workers-in-cyber-operations/</loc>
		<lastmod>2025-07-26T09:35:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sichere-messenger-statt-whatsapp-threemas-argumente-uberzeugen-niemanden/</loc>
		<lastmod>2025-07-26T10:35:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-investigates-leak-in-early-warning-system-used-by-chinese-hackers-to-exploit-sharepoint-vulnerabilities/</loc>
		<lastmod>2025-07-26T10:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-stop-using-china-based-teams-to-support-department-of-defense/</loc>
		<lastmod>2025-07-26T11:35:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arizona-woman-sentenced-for-aiding-north-korea-in-u-s-it-job-fraud-scheme/</loc>
		<lastmod>2025-07-26T11:35:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwickler-aufgepasst-bsi-warnt-vor-bias-in-ki-systemen/</loc>
		<lastmod>2025-07-26T11:35:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blame-a-leak-for-microsoft-sharepoint-attacks-researcher-insists/</loc>
		<lastmod>2025-07-26T12:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-expose-massive-online-fake-currency-operation-in-india/</loc>
		<lastmod>2025-07-26T12:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poisonseed-attack-turns-out-to-be-not-a-fido-bypass-after-all/</loc>
		<lastmod>2025-07-26T12:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congress-tries-to-outlaw-ai-that-jacks-up-prices-based-on-what-it-knows-about-you/</loc>
		<lastmod>2025-07-26T13:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-official-gaming-mouse-software-to-spread-windows-based-xred-malware/</loc>
		<lastmod>2025-07-26T13:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharepoint-schwachstellen-haben-weltweite-folgen/</loc>
		<lastmod>2025-07-26T13:35:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-says-majority-of-customers-personal-data-stolen-in-cyberattack/</loc>
		<lastmod>2025-07-26T14:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prazise-statt-spekulative-kontrolle-fur-mobile-datenstrome/</loc>
		<lastmod>2025-07-26T14:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privilegedmanagement-reduziert-sicherheitsvorfalle-im-zusammenhang-mit-dem-missbrauch-von-privilegien-nahezu-um-die-halfte/</loc>
		<lastmod>2025-07-26T15:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-europaische-cloud-losungen-unverzichtbar-sind/</loc>
		<lastmod>2025-07-26T15:35:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-lasst-sich-auch-durch-securemail-gateways-nicht-aufhalten/</loc>
		<lastmod>2025-07-26T15:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-operations-seized-blacksuit-ransomware-gangs-darknet-sites/</loc>
		<lastmod>2025-07-26T15:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dating-safety-app-tea-breached-exposing-72000-user-images/</loc>
		<lastmod>2025-07-26T17:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-confirms-data-breach-impacts-majority-of-1-4-million-customers/</loc>
		<lastmod>2025-07-26T18:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks/</loc>
		<lastmod>2025-07-26T18:35:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumpet-of-patriots-hack-calls-for-political-parties-to-be-forced-to-report-data-breaches/</loc>
		<lastmod>2025-07-26T20:35:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/political-parities-hold-vast-amounts-of-data-about-australians-experts-say-its-a-growing-risk/</loc>
		<lastmod>2025-07-26T21:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unberechtigte-abbuchungen-auf-debit-karte-datenabfluss-bei-commerzbank/</loc>
		<lastmod>2025-07-26T22:35:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unberechtigte-abbuchungen-bei-hypovereinsbank-kreditkarte-datenabfluss/</loc>
		<lastmod>2025-07-26T22:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-training-bei-meta-umfrage-der-verbraucherzentrale-nrw-gestartet/</loc>
		<lastmod>2025-07-26T23:35:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugsfalle-iphone-nutzer-haufiger-opfer-als-android-anwender/</loc>
		<lastmod>2025-07-26T23:35:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/political-parties-hold-vast-amounts-of-data-about-australians-experts-say-its-a-growing-risk/</loc>
		<lastmod>2025-07-27T03:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/milliardenschwere-krypto-raubzuge-warum-nordkoreanische-hacker-so-erfolgreich-bitcoin-und-ether-abgreifen/</loc>
		<lastmod>2025-07-27T03:35:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-security-fachkrafte-sind-begehrt-primar-in-diesem-bereich-sticht-der-bedarf-heraus/</loc>
		<lastmod>2025-07-27T03:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turkischer-rustungssektor-im-visier-von-dropping-elephant/</loc>
		<lastmod>2025-07-27T04:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-zur-grosten-cyberbedrohung-wird/</loc>
		<lastmod>2025-07-27T04:35:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staatliche-it-systeme-proaktiv-schutzen-bessere-erkennung-von-angriffen/</loc>
		<lastmod>2025-07-27T04:35:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-walks-us-through-copilot-search-with-a-domain-it-doesnt-even-own/</loc>
		<lastmod>2025-07-27T05:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-534-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-07-27T06:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/debian-isnt-waiting-for-2038-to-blow-up-switches-to-64-bit-time-for-everything/</loc>
		<lastmod>2025-07-27T07:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-55/</loc>
		<lastmod>2025-07-27T07:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-microsoft-sharepoint-servers-under-attack-landing-your-first-cybersecurity-job/</loc>
		<lastmod>2025-07-27T08:35:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intel-abandons-chip-plants-in-germany-and-poland-confirms-more-layoffs/</loc>
		<lastmod>2025-07-27T10:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-lebensversicherung-allianz-life-hacker-stehlen-daten-der-meisten-kunden/</loc>
		<lastmod>2025-07-27T12:35:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intel-to-throw-networking-biz-over-the-side-of-its-rapidly-shrinking-ship/</loc>
		<lastmod>2025-07-27T13:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drastischer-anstieg-von-phishing-betrug-zu-beginn-der-sommersaison/</loc>
		<lastmod>2025-07-27T14:35:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-erwartet-uns-in-der-nachsten-phase-des-ki-betrugs/</loc>
		<lastmod>2025-07-27T15:35:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsmanagement-dient-als-strategisches-instrument-im-kampf-gegen-datenpannen-und-schlechte-versicherungskonditionen/</loc>
		<lastmod>2025-07-27T15:35:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/first-release-candidate-of-systemd-258-is-here/</loc>
		<lastmod>2025-07-27T15:35:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-is-running-a-vmware-esxi-hacking-spree/</loc>
		<lastmod>2025-07-27T15:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arizona-woman-jailed-for-helping-north-korea-in-17m-it-job-scam/</loc>
		<lastmod>2025-07-27T18:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-data-breach-exposed-the-data-of-most-of-its-1-4m-customers/</loc>
		<lastmod>2025-07-27T18:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-targets-healthcare-in-stealth-attacks-say-u-s-cyber-agencies/</loc>
		<lastmod>2025-07-27T20:35:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-heartbreak-of-watching-a-parent-fall-for-fraud-dad-this-is-a-scam-have-you-given-her-money-naima-brown/</loc>
		<lastmod>2025-07-27T20:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-forms-kaspersky-warnt-vor-missbrauch-fur-krypto-scam/</loc>
		<lastmod>2025-07-27T22:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mainboard-updates-amd-tpm-bug-ungefixt-gigabyte-bios-fixes/</loc>
		<lastmod>2025-07-27T22:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-missbrauchen-remote-management-tools-fur-attacken-auf-jobsucher/</loc>
		<lastmod>2025-07-27T23:35:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-email-gateways-allein-noch-kein-hinreichender-schutz-vor-phishing/</loc>
		<lastmod>2025-07-27T23:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapores-critical-infrastructure-under-attack-by-china-linked-unc3886-apt/</loc>
		<lastmod>2025-07-28T03:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-aligned-hive0156-escalates-remcos-rat-attacks-on-ukrainian-government-military/</loc>
		<lastmod>2025-07-28T03:35:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkweb-das-verkannte-security-tool/</loc>
		<lastmod>2025-07-28T04:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-fight-document-fraud-with-the-latest-tech-tools/</loc>
		<lastmod>2025-07-28T04:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnhuntr-open-source-tool-to-identify-remotely-exploitable-vulnerabilities/</loc>
		<lastmod>2025-07-28T05:35:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/review-llm-engineers-handbook/</loc>
		<lastmod>2025-07-28T05:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-salesforce-flaws-allow-remote-code-execution-patch-immediately/</loc>
		<lastmod>2025-07-28T05:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaws-in-niagara-framework-threaten-smart-buildings-and-industrial-systems-worldwide/</loc>
		<lastmod>2025-07-28T05:35:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-sicherheitsempfehlungen-und-iocs-day-exploit-in-crushftp-entdeckt/</loc>
		<lastmod>2025-07-28T05:35:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-locken-jobsuchende-in-die-falle/</loc>
		<lastmod>2025-07-28T06:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-die-steuerbehorde-von-curacao/</loc>
		<lastmod>2025-07-28T06:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-telekommunikationsdienstleister-in-luxemburg/</loc>
		<lastmod>2025-07-28T06:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-stadtverwaltung-in-rhode-island-usa/</loc>
		<lastmod>2025-07-28T06:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbefugter-zugriff-bei-einer-universitat-in-utah-usa/</loc>
		<lastmod>2025-07-28T06:36:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-zwischenfall-bei-einem-us-motorsportverband/</loc>
		<lastmod>2025-07-28T06:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-resilience-critical-as-ransomware-attacks-target-backups/</loc>
		<lastmod>2025-07-28T06:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-supply-chain-security-strategy-might-be-missing-the-biggest-risk/</loc>
		<lastmod>2025-07-28T06:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-legal-minefield-of-hacking-back/</loc>
		<lastmod>2025-07-28T06:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-salesforce-tableau-flaws-allow-remote-code-execution-patch-immediately/</loc>
		<lastmod>2025-07-28T06:37:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nato-gipfel-setzt-zeichen-cybersicherheit-in-zeiten-geopolitischer-spannungen/</loc>
		<lastmod>2025-07-28T06:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aiims-orbo-portal-vulnerability-leads-to-massive-data-exposure/</loc>
		<lastmod>2025-07-28T07:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leak-zone-dark-web-forum-breach-exposes-22-million-user-ips-and-locations/</loc>
		<lastmod>2025-07-28T07:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-toolshell-exploit-targets-sharepoint-servers-for-full-takeover/</loc>
		<lastmod>2025-07-28T07:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lg-innotek-camera-flaws-could-give-hackers-full-admin-access/</loc>
		<lastmod>2025-07-28T07:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-hijacks-vmware-esxi-to-deploy-ransomware-on-critical-u-s-infrastructure/</loc>
		<lastmod>2025-07-28T07:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/werkzeug-fur-automatisierte-datensicherung-borgbackup-open-source-backup-mit-deduplizierung/</loc>
		<lastmod>2025-07-28T07:36:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-schattenwesen-wenn-maschinenidentitaten-aus-dem-ruder-laufen/</loc>
		<lastmod>2025-07-28T07:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwickler-tool-von-amazon-verseucht/</loc>
		<lastmod>2025-07-28T08:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cisos-challenge-getting-colleagues-to-understand-what-you-do/</loc>
		<lastmod>2025-07-28T08:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shuyal-emerges-stealing-login-credentials-from-19-major-browsers/</loc>
		<lastmod>2025-07-28T08:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schatten-ki-unternehmen-brauchen-einen-systematischen-umgang-mit-kunstlicher-intelligenz/</loc>
		<lastmod>2025-07-28T08:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-500-us-dollar-schadenersatz-nackter-polizist-bei-google-street-view/</loc>
		<lastmod>2025-07-28T08:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funf-grundlagen-fur-das-cybersicherheitsprogramm-der-zukunft/</loc>
		<lastmod>2025-07-28T08:38:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-cybersecurity-needs-what-the-market-is-telling-us/</loc>
		<lastmod>2025-07-28T09:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-den-livestream-eines-fusballspiels/</loc>
		<lastmod>2025-07-28T09:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dating-app-breach-exposes-images-of-13000-women/</loc>
		<lastmod>2025-07-28T09:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-102-zero-day-lucke-in-sharepoint-schockt-admins/</loc>
		<lastmod>2025-07-28T09:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/panne-bei-copilot-search-microsoft-verweist-auf-domain-die-es-gar-nicht-besitzt/</loc>
		<lastmod>2025-07-28T09:36:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-software-licensing-playbook-is-a-national-security-risk/</loc>
		<lastmod>2025-07-28T10:35:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-iso-file-used-in-romance-scam-targeting-german-speakers/</loc>
		<lastmod>2025-07-28T10:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-group-fire-ant-exploits-vmware-and-f5-flaws-since-early-2025/</loc>
		<lastmod>2025-07-28T10:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-breach-intelligence-portal-used-by-the-cia-and-other-agencies/</loc>
		<lastmod>2025-07-28T10:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-woman-gets-eight-years-for-part-in-17m-north-korean-scheme/</loc>
		<lastmod>2025-07-28T10:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-stephan-koninger-it-consultant-codecentric-ein-disaster-recovery-plan-muss-individuell-angepasst-werden/</loc>
		<lastmod>2025-07-28T10:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secuinfra-wird-ag-aktiengesellschaft-als-grundlage-fur-globale-expansion/</loc>
		<lastmod>2025-07-28T11:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/400000-wordpress-websites-exposed-by-post-smtp-plugin-vulnerability/</loc>
		<lastmod>2025-07-28T11:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc3944-ransomware-attacks-target-u-s-infrastructure-via-vmware-exploits/</loc>
		<lastmod>2025-07-28T11:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-claim-breach-of-airpay-payment-gateway/</loc>
		<lastmod>2025-07-28T11:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/womens-dating-app-tea-data-leak-exposes-13000-user-selfies/</loc>
		<lastmod>2025-07-28T11:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spacenet-kommentiert-aktuelle-sharepoint-sicherheitslucke/</loc>
		<lastmod>2025-07-28T11:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-fire-ant-spies-start-to-bite-unpatched-vmware-instances/</loc>
		<lastmod>2025-07-28T12:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-attack-obtains-data-on-majority-of-allianz-life-customers/</loc>
		<lastmod>2025-07-28T12:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wochentlich-1286-cyberangriffe-auf-deutsche-unternehmen-im-q2-2025/</loc>
		<lastmod>2025-07-28T12:36:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aeroflot-aeroflops-over-it-issues-after-attackers-claim-year-long-compromise/</loc>
		<lastmod>2025-07-28T12:37:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-app-breach-women-only-dating-platform-leaks-72k-user-images/</loc>
		<lastmod>2025-07-28T12:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-fire-ant-spies-start-to-bite-unpatched-vmware-instances-2/</loc>
		<lastmod>2025-07-28T12:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-targets-vmware-esxi-in-using-social-engineering/</loc>
		<lastmod>2025-07-28T12:38:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/atomic-macos-stealer-upgraded-with-remote-access-backdoor/</loc>
		<lastmod>2025-07-28T12:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-muddled-libras-playbook-call-center-attacks-for-initial-breach/</loc>
		<lastmod>2025-07-28T12:38:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-laundry-bear-unveiling-infrastructure-tactics-and-procedures/</loc>
		<lastmod>2025-07-28T12:38:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-security-is-stuck-in-the-antivirus-era-why-it-needs-a-modern-approach/</loc>
		<lastmod>2025-07-28T12:39:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/naval-group-denies-hack-claims-alleges-reputational-attack/</loc>
		<lastmod>2025-07-28T12:39:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharepoint-angriffe-hacker-umgehen-microsofts-patch-mit-nur-einem-zeichen/</loc>
		<lastmod>2025-07-28T12:39:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-inside-look-into-how-a-coalition-of-state-legislators-plan-to-take-on-data-brokers/</loc>
		<lastmod>2025-07-28T13:36:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-airline-aeroflot-hit-by-cyberattack-hackers-threaten-to-leak-passenger-data/</loc>
		<lastmod>2025-07-28T13:36:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberresilienz-als-strategischer-imperativ/</loc>
		<lastmod>2025-07-28T13:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/npm-is-package-with-2-8m-weekly-downloads-exploited-in-attack-on-developers/</loc>
		<lastmod>2025-07-28T13:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-ethical-hacking-service-providers-in-2025/</loc>
		<lastmod>2025-07-28T13:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-as-a-service-gets-cheaper-packing-2fa-interception/</loc>
		<lastmod>2025-07-28T13:39:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-party-breach-impacts-majority-of-allianz-life-us-customers/</loc>
		<lastmod>2025-07-28T13:39:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-aeroflot-causing-mass-flight-disruptions-russia-says/</loc>
		<lastmod>2025-07-28T14:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-app-data-theft-scandal-worsens-as-stolen-ids-leaked-to-cybercriminal-forum/</loc>
		<lastmod>2025-07-28T14:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-inside-look-into-how-a-coalition-of-state-legislators-plans-to-take-on-data-brokers/</loc>
		<lastmod>2025-07-28T14:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-registered-data-brokers-ignore-user-requests-around-personal-data/</loc>
		<lastmod>2025-07-28T14:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flights-grounded-as-russias-largest-airline-aeroflot-hacked-and-systems-destroyed/</loc>
		<lastmod>2025-07-28T14:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usaverhandlungen-das-tauziehen-um-nvidias-h20-geht-in-die-nachste-runde/</loc>
		<lastmod>2025-07-28T14:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-wordpress-post-smtp-plugin-flaw-exposes-200k-sites-to-full-takeover/</loc>
		<lastmod>2025-07-28T14:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-tool-autoswagger-finds-the-api-flaws-attackers-hope-you-miss/</loc>
		<lastmod>2025-07-28T14:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm-honeypots-deceive-hackers-into-exposing-attack-methods/</loc>
		<lastmod>2025-07-28T14:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-spot-malicious-ai-agents-before-they-strike/</loc>
		<lastmod>2025-07-28T14:37:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-sharepoint-breach-spyware-iot-hijacks-dprk-fraud-crypto-drains-and-more/</loc>
		<lastmod>2025-07-28T14:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-scattered-spider-tactics-target-vmware-vsphere-environments/</loc>
		<lastmod>2025-07-28T14:38:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-sieht-die-zusammenarbeit-aus-bsi-und-google-wollen-sichere-cloud-losungen-entwickeln/</loc>
		<lastmod>2025-07-28T14:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-hiring-trends-stellenbesetzung-dauert-in-deutschland-besonders-lange/</loc>
		<lastmod>2025-07-28T14:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/research-shows-llms-can-conduct-sophisticated-attacks-without-humans/</loc>
		<lastmod>2025-07-28T15:36:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-discloses-massive-data-breach-linked-to-supply-chain-attack/</loc>
		<lastmod>2025-07-28T15:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sen-hassan-wants-to-hear-from-spacex-about-scammers-abusing-starlink/</loc>
		<lastmod>2025-07-28T15:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-alerts-tie-together-threats-of-cybercrime-physical-violence-from-the-com/</loc>
		<lastmod>2025-07-28T15:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-submarine-secrets-surface-after-cyber-attack/</loc>
		<lastmod>2025-07-28T15:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-fachkraftemangel-bei-cyberintelligence-ist-in-deutschland-signifikant/</loc>
		<lastmod>2025-07-28T15:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lamehug-erste-dokumentierte-ki-malware/</loc>
		<lastmod>2025-07-28T15:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/majority-of-1-4m-customers-caught-in-allianz-life-data-heist/</loc>
		<lastmod>2025-07-28T15:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-cloudguard-waf-expands-in-uk-with-new-pop/</loc>
		<lastmod>2025-07-28T15:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-autoswagger-tool-finds-the-api-flaws-attackers-hope-you-miss/</loc>
		<lastmod>2025-07-28T15:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaws-in-wordpress-plugin-leave-10000-sites-vulnerable/</loc>
		<lastmod>2025-07-28T15:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fluge-abgesagt-hackerangriff-legt-aeroflot-lahm/</loc>
		<lastmod>2025-07-28T15:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seeing-is-believing-in-biomedicine-which-isnt-great-when-ai-gets-it-wrong/</loc>
		<lastmod>2025-07-28T16:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-vpn-demand-soars-after-debut-of-online-safety-act/</loc>
		<lastmod>2025-07-28T16:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-is-a-minefield-of-micro-aggressions-in-the-shipping-lane-of-progress/</loc>
		<lastmod>2025-07-28T16:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-flag-carrier-cancels-flights-after-hack-attack/</loc>
		<lastmod>2025-07-28T16:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dropzone-ai-gets-37m-to-build-out-cyber-ai-agent-ecosystem/</loc>
		<lastmod>2025-07-28T16:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frances-warship-builder-naval-group-investigates-1tb-data-breach/</loc>
		<lastmod>2025-07-28T16:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-prepares-gpt-5-for-roll-out/</loc>
		<lastmod>2025-07-28T16:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-will-stop-supporting-windows-11-22h2-in-october/</loc>
		<lastmod>2025-07-28T16:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-could-rival-google-shopping-with-chatgpt-shop/</loc>
		<lastmod>2025-07-28T16:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-archive-is-now-a-us-federal-depository-library/</loc>
		<lastmod>2025-07-28T16:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophisticated-shuyal-stealer-targets-19-browsers-demonstrates-advanced-evasion/</loc>
		<lastmod>2025-07-28T16:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-hit-by-hackers-customer-and-staff-personal-data-stolen/</loc>
		<lastmod>2025-07-28T17:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-dating-advice-app-spills-sensitive-data/</loc>
		<lastmod>2025-07-28T17:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-smtp-plugin-flaw-allowed-subscribers-to-take-over-admin-accounts/</loc>
		<lastmod>2025-07-28T17:36:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-papercut-rce-bug-as-exploited-in-attacks-patch-now/</loc>
		<lastmod>2025-07-28T17:36:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raven-stealer-malware-exploits-telegram-to-steal-logins-payment-data-and-autofill-info/</loc>
		<lastmod>2025-07-28T17:36:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-ukrainian-hackers-take-credit-for-attack-that-snarls-russian-flight-travel/</loc>
		<lastmod>2025-07-28T18:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senator-presses-musk-on-starlink-misuse-by-southeast-asian-scammers/</loc>
		<lastmod>2025-07-28T18:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-sploitlight-flaw-exposes-apple-intelligence-cached-data-to-attackers/</loc>
		<lastmod>2025-07-28T18:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-drones-to-dashboards-apps-accelerate-food-delivery/</loc>
		<lastmod>2025-07-28T18:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-sploitlight-flaw-leaks-apple-intelligence-data/</loc>
		<lastmod>2025-07-28T18:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-available-for-critical-cisco-ise-bug-exploited-in-attacks/</loc>
		<lastmod>2025-07-28T18:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-exploit-software-vulnerabilities-to-breach-targeted-systems/</loc>
		<lastmod>2025-07-28T18:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc3886-hackers-target-singapores-critical-infrastructure-by-exploiting-0-day-vulnerabilities/</loc>
		<lastmod>2025-07-28T18:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-looks-sexy-but-its-wrong-the-problem-with-ai-in-biology-and-medicine/</loc>
		<lastmod>2025-07-28T18:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-breach-toptal-github-publish-10-malicious-npm-packages-with-5000-downloads/</loc>
		<lastmod>2025-07-28T18:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nile-gives-your-campus-network-more-than-just-a-password/</loc>
		<lastmod>2025-07-28T19:35:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-york-state-cyber-chief-calls-out-trump-for-cybersecurity-cuts/</loc>
		<lastmod>2025-07-28T19:36:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-launching-ransomware-on-hijacked-vmware-systems-google/</loc>
		<lastmod>2025-07-28T19:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/endgame-gear-mouse-config-tool-infected-users-with-malware/</loc>
		<lastmod>2025-07-28T19:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toolshell-uncovering-five-critical-vulnerabilities-in-microsoft-sharepoint/</loc>
		<lastmod>2025-07-28T19:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oyster-backdoor-disguised-as-putty-and-keypass-targets-it-admins-via-seo-poisoning/</loc>
		<lastmod>2025-07-28T19:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-breach-tied-to-crm-compromise/</loc>
		<lastmod>2025-07-28T20:36:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sharepoint-hackers-switch-gears-to-spread-ransomware/</loc>
		<lastmod>2025-07-28T20:37:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-gemini-cli-ai-coding-assistant-allowed-stealthy-code-execution/</loc>
		<lastmod>2025-07-28T20:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armouryloader-bypasses-security-protections-to-inject-malicious-code/</loc>
		<lastmod>2025-07-28T20:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insurance-giant-allianz-life-grapples-with-breach-affecting-majority-of-customers/</loc>
		<lastmod>2025-07-28T20:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chaos-ransomware-rises-as-blacksuit-gang-falls/</loc>
		<lastmod>2025-07-28T20:37:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-flag-flaw-in-googles-ai-coding-assistant-that-allowed-for-silent-code-exfiltration/</loc>
		<lastmod>2025-07-28T21:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-cisco-ise-and-papercut-ng-mf-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-07-28T21:35:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-system-settles-web-tracker-lawsuit-for-up-to-9-25m/</loc>
		<lastmod>2025-07-28T21:35:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-app-leak-worsens-with-second-database-exposing-user-chats/</loc>
		<lastmod>2025-07-28T21:35:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-auf-veraltete-libcurl-bibliotheken-in-programmen-uberprufen/</loc>
		<lastmod>2025-07-28T22:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-pros-are-drowning-in-threat-intel-data-and-its-making-everything-more-dangerous/</loc>
		<lastmod>2025-07-28T22:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-group-ransomware-claims-breach-of-media-giant-albavisia%c2%b3n/</loc>
		<lastmod>2025-07-28T22:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corelight-uses-gen-ai-to-power-smarter-threat-detection/</loc>
		<lastmod>2025-07-28T22:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rise-of-chaos-ransomware-tied-to-blacksuit-groups-exit/</loc>
		<lastmod>2025-07-28T22:36:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-resilienz-und-gute-versicherungskonditionen-mittels-iga/</loc>
		<lastmod>2025-07-28T23:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nachste-phase-des-ki-betrugs-kombination-herkommlicher-tools-mit-ki-zur-abwehr/</loc>
		<lastmod>2025-07-28T23:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lumma-stealer-back-in-cyberspace-als-neue-verbesserte-version/</loc>
		<lastmod>2025-07-28T23:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-spotlights-apple-bug-patched-in-march-as-sharepoint-exploits-continue/</loc>
		<lastmod>2025-07-28T23:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-uncovers-macos-flaw-allowing-bypass-tcc-protections-and-exposing-sensitive-data/</loc>
		<lastmod>2025-07-29T03:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lovense-sex-toy-app-flaw-leaks-private-user-email-addresses/</loc>
		<lastmod>2025-07-29T03:36:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/endpoint-security-cyberresilienz-als-strategischer-imperativ/</loc>
		<lastmod>2025-07-29T04:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sommerloch-oder-hochsaison-fur-cyberkriminelle/</loc>
		<lastmod>2025-07-29T04:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharepoint-sicherheitslucken-drei-universitaten-von-it-schwachstelle-toolshell-betroffen/</loc>
		<lastmod>2025-07-29T05:38:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-in-ihre-schranken-weisen/</loc>
		<lastmod>2025-07-29T05:36:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empathie-trifft-it-sicherheit-der-weg-zu-gelebter-compliance/</loc>
		<lastmod>2025-07-29T05:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-final-frontier-of-cybersecurity-is-now-in-space/</loc>
		<lastmod>2025-07-29T05:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-application-security-crisis-no-one-wants-to-talk-about/</loc>
		<lastmod>2025-07-29T05:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aeroflot-hit-by-yearlong-cyber-operation-that-allegedly-wiped-7000-servers/</loc>
		<lastmod>2025-07-29T05:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc3886-exploits-multiple-0-day-bugs-in-vmware-vcenter-esxi-and-fortinet-fortios/</loc>
		<lastmod>2025-07-29T05:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-papercut-ng-mf-csrf-vulnerability-to-kev-catalog-amid-active-exploitation/</loc>
		<lastmod>2025-07-29T05:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-unter-dauerbeschuss-wochentlich-1286-cyberangriffe/</loc>
		<lastmod>2025-07-29T06:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-25-technology-disrupters-of-2025/</loc>
		<lastmod>2025-07-29T06:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pellera-technologies-ceo-on-driving-endend-offering-for-modern-it-security/</loc>
		<lastmod>2025-07-29T06:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharepoint-attacks-should-lead-companies-to-rethink-risk-of-on-prem-vs-cloud-expert/</loc>
		<lastmod>2025-07-29T06:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-sharepoint-attacks-now-include-ransomware/</loc>
		<lastmod>2025-07-29T06:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyst-palo-alto-networks-sentinelone-ma-deal-highly-unlikely/</loc>
		<lastmod>2025-07-29T06:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-major-cyberattacks-and-data-breaches-in-2025-so-far/</loc>
		<lastmod>2025-07-29T06:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clorox-sues-cognizant-for-allegedly-providing-network-credentials-without-authentication/</loc>
		<lastmod>2025-07-29T06:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victims-mounting-in-microsoft-sharepoint-attacks-researchers/</loc>
		<lastmod>2025-07-29T06:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dashlane-revamps-partner-program-hires-first-channel-chief-for-credential-security-push/</loc>
		<lastmod>2025-07-29T06:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vciso-in-action-navigating-cybersecurity-leadership-beyond-office-walls/</loc>
		<lastmod>2025-07-29T06:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-staatliche-russische-fluggesellschaft/</loc>
		<lastmod>2025-07-29T06:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-behavioral-intelligence-is-becoming-the-bank-fraud-teams-best-friend/</loc>
		<lastmod>2025-07-29T06:38:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-will-thrive-until-we-change-our-strategy/</loc>
		<lastmod>2025-07-29T06:38:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-cisco-identity-services-engine-flaw-exploited-in-active-attacks/</loc>
		<lastmod>2025-07-29T06:38:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschlands-cyberabwehr-unter-druck-warum-hacker-deutschland-ins-visier-nehmen/</loc>
		<lastmod>2025-07-29T06:39:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-healthcare-industry-is-at-a-cybersecurity-crossroads/</loc>
		<lastmod>2025-07-29T07:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-red-teams-find-hidden-flaws-before-attackers-do/</loc>
		<lastmod>2025-07-29T07:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyble-launches-essential-8-cybersecurity-support-package-for-australian-financial-sector/</loc>
		<lastmod>2025-07-29T07:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyble-uncovers-redhook-android-trojan-targeting-vietnamese-users/</loc>
		<lastmod>2025-07-29T07:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-outage-hits-users-globally-core-services-unavailable/</loc>
		<lastmod>2025-07-29T07:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-papercut-rce-vulnerability-under-active-exploitation/</loc>
		<lastmod>2025-07-29T07:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-exploit-published-for-actively-exploited-cisco-identity-services-engine-flaw/</loc>
		<lastmod>2025-07-29T07:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/private-cloud-gewinnt-an-bedeutung-studie-sicherheit-compliance-und-ki-im-fokus/</loc>
		<lastmod>2025-07-29T07:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-circle-awareness-training-neu-gedacht/</loc>
		<lastmod>2025-07-29T08:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-circle-awareness-training-neu-gedacht-2/</loc>
		<lastmod>2025-07-29T08:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-attack-seychelles-offshore-banking-as-a-target/</loc>
		<lastmod>2025-07-29T08:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-attack-seychelles-offshore-banking-as-a-target-2/</loc>
		<lastmod>2025-07-29T08:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-hack-mehrheit-der-16-mio-kunden-betroffen/</loc>
		<lastmod>2025-07-29T08:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-hack-mehrheit-der-16-mio-kunden-betroffen-2/</loc>
		<lastmod>2025-07-29T08:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-phishing-to-target-belgian-grand-prix-fans-and-teams/</loc>
		<lastmod>2025-07-29T08:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-phishing-to-target-belgian-grand-prix-fans-and-teams-2/</loc>
		<lastmod>2025-07-29T08:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/naval-group-hacker-erpresst-franzosischen-kriegsschiffhersteller/</loc>
		<lastmod>2025-07-29T08:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/naval-group-hacker-erpresst-franzosischen-kriegsschiffhersteller/</loc>
		<lastmod>2025-07-29T08:36:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ermittler-stoppen-erpresser-software-von-blacksuit-royal/</loc>
		<lastmod>2025-07-29T09:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-flugausfallen-sprechen-hacker-und-kreml-von-angriff/</loc>
		<lastmod>2025-07-29T09:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seychelles-commercial-bank-reported-cybersecurity-incident/</loc>
		<lastmod>2025-07-29T09:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lionishackers-exfiltrate-sensitive-corporate-databases-for-sale-on-the-dark-web/</loc>
		<lastmod>2025-07-29T09:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-6-16-released-with-performance-and-networking-enhancements/</loc>
		<lastmod>2025-07-29T09:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-macos-vulnerability-allows-attackers-to-steal-private-files-by-bypassing-tcc/</loc>
		<lastmod>2025-07-29T09:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-iis-servers-with-new-web-shell-script-for-full-remote-control/</loc>
		<lastmod>2025-07-29T09:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-ukraine-hacktivists-ground-dozens-of-aeroflot-flights/</loc>
		<lastmod>2025-07-29T09:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-ebook-multisicherheit-so-wird-die-multi-cloud-nicht-zum-multi-risiko/</loc>
		<lastmod>2025-07-29T09:37:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hycu-erneut-als-visionar-im-gartner-magic-quadrant-for-backup-and-data-protection-platforms-positioniert/</loc>
		<lastmod>2025-07-29T09:37:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grosbritannien-nutzer-uberlisten-alterskontrollen-mit-einem-videospiel/</loc>
		<lastmod>2025-07-29T09:38:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheitsausgaben-wachsen-langsamer/</loc>
		<lastmod>2025-07-29T10:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insights-from-talos-ir-navigating-nis2-technical-implementation/</loc>
		<lastmod>2025-07-29T10:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-sharepoint-attacks-hammer-globe/</loc>
		<lastmod>2025-07-29T10:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/charity-fined-after-destroying-irreplaceable-records/</loc>
		<lastmod>2025-07-29T10:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kostenloses-recovery-tool-fur-windows-10-11-geloschte-daten-zuverlassig-wiederherstellen-mit-puran-file-recovery/</loc>
		<lastmod>2025-07-29T10:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cybersecurity-cuts-putting-nation-at-risk-warns-new-york-cyber-chief/</loc>
		<lastmod>2025-07-29T11:35:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-cisco-ise-and-papercut-vulnerabilities-to-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-07-29T11:36:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-scattered-spider-used-fake-calls-to-breach-clorox-via-cognizant/</loc>
		<lastmod>2025-07-29T11:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-ukraine-hacktivists-claim-cyberattack-on-russian-airline-aeroflot-that-caused-the-cancellation-of-100-flights/</loc>
		<lastmod>2025-07-29T11:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-finserv-firms-can-navigate-secure-open-finance-in-2025-and-beyond/</loc>
		<lastmod>2025-07-29T11:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pci-dss-4-0-1-pushes-e-commerce-to-secure-apps-fast/</loc>
		<lastmod>2025-07-29T11:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/age-verification-laws-send-vpn-use-soaring-and-threaten-the-open-internet/</loc>
		<lastmod>2025-07-29T11:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-alerts-developers-to-new-phishing-attack-using-fake-pypi-site/</loc>
		<lastmod>2025-07-29T11:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einhaus-gruppe-hacker-ruinieren-grosen-deutschen-elektronikversicherer/</loc>
		<lastmod>2025-07-29T11:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sex-toy-maker-lovense-caught-leaking-users-email-addresses-and-exposing-accounts-to-takeovers/</loc>
		<lastmod>2025-07-29T12:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/war-games-mod-asks-soldiers-with-1337-skillz-to-compete-in-esports/</loc>
		<lastmod>2025-07-29T12:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-passwords-a-guide-to-advanced-enterprise-security-protection/</loc>
		<lastmod>2025-07-29T12:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-introduces-new-join-bar-to-help-users-join-meetings-on-time/</loc>
		<lastmod>2025-07-29T12:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-reveal-technical-details-of-sonicwall-sma100-series-n-day-vulnerabilities/</loc>
		<lastmod>2025-07-29T12:36:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-introduces-containerization-feature-for-seamless-kali-linux-integration-on-macos/</loc>
		<lastmod>2025-07-29T12:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-browser-became-the-main-cyber-battleground/</loc>
		<lastmod>2025-07-29T12:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-use-fake-apps-to-steal-data-and-blackmail-users-across-asias-mobile-networks/</loc>
		<lastmod>2025-07-29T12:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-react-didnt-kill-xss-the-new-javascript-injection-playbook/</loc>
		<lastmod>2025-07-29T12:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-exploited-critical-vulnerabilities-in-cisco-identity-services-engine/</loc>
		<lastmod>2025-07-29T12:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-2-4m-in-crypto-from-chaos-ransomware-gang/</loc>
		<lastmod>2025-07-29T12:38:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sicherheitslucke-china-warnt-vor-diffamierung/</loc>
		<lastmod>2025-07-29T12:38:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auto-color-rat-targets-sap-netweaver-bug-in-an-advanced-cyberattack/</loc>
		<lastmod>2025-07-29T13:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sebastian-back-ist-neuer-director-cloud-msp-channel-bei-versa-networks/</loc>
		<lastmod>2025-07-29T13:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-erweitert-globale-prasenz-mit-neuem-deutschen-point-of-presence-fur/</loc>
		<lastmod>2025-07-29T13:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/squarex-discloses-architectural-limitations-of-browser-devtools-in-debugging-malicious-extensions/</loc>
		<lastmod>2025-07-29T13:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fighting-ai-with-ai-how-darwinium-is-reshaping-fraud-defense/</loc>
		<lastmod>2025-07-29T13:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-codeigniter-flaw-exposes-millions-of-web-apps-to-file-upload-attacks/</loc>
		<lastmod>2025-07-29T13:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attacks-spotted-in-github-actions-gravity-forms-npm/</loc>
		<lastmod>2025-07-29T13:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/root-evidence-bets-on-new-concept-for-vulnerability-patch-management/</loc>
		<lastmod>2025-07-29T13:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-students-drain-money-resources-from-educational-sector/</loc>
		<lastmod>2025-07-29T13:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-risk-index-helps-organizations-tackle-cloud-security-chaos/</loc>
		<lastmod>2025-07-29T13:37:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orange-frances-largest-telecoms-company-hit-by-cyberattack/</loc>
		<lastmod>2025-07-29T14:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-says-more-than-30-suspects-face-trial-over-pro-russian-sabotage/</loc>
		<lastmod>2025-07-29T14:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/200000-wordpress-websites-at-risk-of-being-hijacked-due-to-vulnerable-post-smtp-plugin/</loc>
		<lastmod>2025-07-29T14:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ipv6-hat-mindestens-genauso-viele-sicherheitsprobleme-wie-das-altbekannte-ipv4/</loc>
		<lastmod>2025-07-29T14:36:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-resilienz-erfordert-einen-ganzheitlichen-ansatz/</loc>
		<lastmod>2025-07-29T14:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raspberry-pi-rp2350-a4-update-fixes-old-bugs-and-dares-you-to-break-it-again/</loc>
		<lastmod>2025-07-29T14:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-netweaver-vulnerability-used-in-auto-color-malware-attack-on-us-firm/</loc>
		<lastmod>2025-07-29T14:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-2-4m-in-bitcoin-from-new-chaos-ransomware-operation/</loc>
		<lastmod>2025-07-29T14:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-attackers-are-still-phishing-phishing-resistant-authentication/</loc>
		<lastmod>2025-07-29T14:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unveiling-the-lumma-password-stealer-attack-infection-chain-and-escalation-tactics-exposed/</loc>
		<lastmod>2025-07-29T14:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/squarex-discloses-architectural-limitations-of-browser-devtools-in-debugging-malicious-extensions-2/</loc>
		<lastmod>2025-07-29T14:38:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-cli-vulnerability-allows-silent-execution-of-malicious-commands-on-developer-systems/</loc>
		<lastmod>2025-07-29T14:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chaos-raas-emerges-after-blacksuit-takedown-demanding-300k-from-u-s-victims/</loc>
		<lastmod>2025-07-29T14:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-vibe-coding-platform-base44-exposed-apps/</loc>
		<lastmod>2025-07-29T14:38:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auto-color-backdoor-malware-exploits-sap-vulnerability/</loc>
		<lastmod>2025-07-29T14:38:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-warnt-vor-ki-krieg-malware-flut-erreicht-neuen-hochststand/</loc>
		<lastmod>2025-07-29T14:39:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacks-against-oil-and-gas-firms-surge/</loc>
		<lastmod>2025-07-29T15:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telecom-giant-orange-warns-of-disruption-amid-ongoing-cyberattack/</loc>
		<lastmod>2025-07-29T15:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-informationen-zur-blacksuit-royal-ransomwaregruppe/</loc>
		<lastmod>2025-07-29T15:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-kommission-darf-ms365-einsetzen/</loc>
		<lastmod>2025-07-29T15:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-data-breach-hits-1-4-million-customers/</loc>
		<lastmod>2025-07-29T15:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/domestic-manufacturing-policy-emphasizes-u-s-tech-products/</loc>
		<lastmod>2025-07-29T15:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saviynt-accelerates-global-expansion-in-europe-asia-pacific-japan-and-the-middle-east/</loc>
		<lastmod>2025-07-29T15:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-edge-now-an-ai-powered-browser-with-copilot-mode/</loc>
		<lastmod>2025-07-29T15:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-telecom-giant-orange-discloses-cyberattack/</loc>
		<lastmod>2025-07-29T15:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-subgroup-tradertraitor-targets-cloud-platforms-and-contaminates-supply-chains/</loc>
		<lastmod>2025-07-29T15:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-authentication-flaw-identified-in-base44-vibe-coding-platform/</loc>
		<lastmod>2025-07-29T15:38:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-warn-about-scattered-spiders-evolving-tactics/</loc>
		<lastmod>2025-07-29T16:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jsceal-malware-bedroht-nutzer-von-krypto-wahrungen-im-grosen-stil/</loc>
		<lastmod>2025-07-29T16:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/</loc>
		<lastmod>2025-07-29T16:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toxicpanda-android-banking-malware-compromises-over-4500-devices-to-harvest-banking-credentials/</loc>
		<lastmod>2025-07-29T16:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-xworm-v6-variant-with-anti-analysis-features-targeting-windows-users-in-active-attacks/</loc>
		<lastmod>2025-07-29T16:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-threat-of-rogue-access/</loc>
		<lastmod>2025-07-29T16:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-uncovers-critical-access-bypass-flaw-in-ai-powered-vibe-coding-platform-base44/</loc>
		<lastmod>2025-07-29T16:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-warns-of-ongoing-phishing-campaign-using-fake-verification-emails-and-lookalike-domain/</loc>
		<lastmod>2025-07-29T16:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-cloudguard-waf-jetzt-mit-lokalem-schutz-in-deutschland-verfugbar/</loc>
		<lastmod>2025-07-29T16:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/altersabfrage-im-internet-sprunghafter-anstieg-von-vpn-nutzung-in-grosbritannien/</loc>
		<lastmod>2025-07-29T16:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mapping-mayhem-securitys-blind-spots-in-identity-security/</loc>
		<lastmod>2025-07-29T17:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-wont-say-if-uk-secretly-demanded-a-backdoor-for-user-data/</loc>
		<lastmod>2025-07-29T17:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-apps-second-data-breach-exposed-over-a-million-private-messages/</loc>
		<lastmod>2025-07-29T17:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-choicejacking-attack-steals-data-from-phones-via-public-chargers/</loc>
		<lastmod>2025-07-29T17:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-cyber-spend-will-top-200bn-this-year-says-gartner/</loc>
		<lastmod>2025-07-29T17:36:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qwins-ltd-bulletproof-hosting-provider-powering-global-malware-campaigns/</loc>
		<lastmod>2025-07-29T17:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unveiling-0bj3ctivitystealers-execution-chain-new-capabilities-and-exfiltration-techniques-exposed/</loc>
		<lastmod>2025-07-29T17:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-vibe-coding-platform-base44-exposes-apps/</loc>
		<lastmod>2025-07-29T17:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-telco-orange-hit-by-cyber-attack/</loc>
		<lastmod>2025-07-29T17:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-cyberark-combination-would-be-watershed-deal-analyst/</loc>
		<lastmod>2025-07-29T18:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-in-talks-to-acquire-identity-security-vendor-cyberark-report/</loc>
		<lastmod>2025-07-29T18:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-app-disables-dms-after-second-data-breach-exposed-over-a-million-private-messages/</loc>
		<lastmod>2025-07-29T18:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-leak-images-and-comments-from-women-dating-safety-app-tea/</loc>
		<lastmod>2025-07-29T18:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/austrian-government-faces-likely-legal-challenge-over-state-spyware/</loc>
		<lastmod>2025-07-29T18:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-ignores-calls-to-reassess-israel-data-adequacy/</loc>
		<lastmod>2025-07-29T18:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-airline-aeroflot-grounds-dozens-of-flights-after-cyberattack/</loc>
		<lastmod>2025-07-29T18:37:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-banking-malware-masquerades-as-government-agencies-to-attack-users/</loc>
		<lastmod>2025-07-29T18:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-gains-momentum-with-legal-assistance-option-for-affiliates/</loc>
		<lastmod>2025-07-29T18:38:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-in-talks-to-acquire-cyberark-for-20-billion-report/</loc>
		<lastmod>2025-07-29T19:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wyden-asks-white-house-to-scrutinize-uk-surveillance-laws/</loc>
		<lastmod>2025-07-29T19:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-is-targeting-victims-snowflake-data-storage-for-quick-exfiltration/</loc>
		<lastmod>2025-07-29T19:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-says-it-will-release-telecom-security-report-sought-by-sen-wyden-to-lift-hold-on-plankey-nomination/</loc>
		<lastmod>2025-07-29T19:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-warn-about-scattered-spider-cyberattacks/</loc>
		<lastmod>2025-07-29T19:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sentinel-data-lake-unify-signals-cut-costs-and-power-agentic-ai/</loc>
		<lastmod>2025-07-29T19:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senator-warns-of-new-uk-surveillance-risks-to-us-citizens-following-apple-back-door-row/</loc>
		<lastmod>2025-07-29T19:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-activates-national-guard-after-st-paul-cyberattack/</loc>
		<lastmod>2025-07-29T19:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-app-data-breach-deepens-with-1-1-million-user-chats-exposed/</loc>
		<lastmod>2025-07-29T20:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-gemini-cli-tool-after-prompt-injection-flaw-uncovered/</loc>
		<lastmod>2025-07-29T20:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-uk-government-has-not-demanded-an-encryption-backdoor-for-its-users-data/</loc>
		<lastmod>2025-07-29T20:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharepoint-zero-days-exploited-to-unleash-warlock-ransomware/</loc>
		<lastmod>2025-07-29T20:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-palo-alto-networks-is-eyeing-a-20b-buy-of-cyberark/</loc>
		<lastmod>2025-07-29T20:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-6-best-password-managers-for-small-businesses-tested-and-trusted/</loc>
		<lastmod>2025-07-29T20:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-watch-out-for-these-signs-scattered-spider-is-spinning-its-web-around-your-org/</loc>
		<lastmod>2025-07-29T21:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orange-reports-major-cyberattack-warns-of-service-disruptions/</loc>
		<lastmod>2025-07-29T21:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-cerner-ehr-hack-breach-reports-still-trickling-in/</loc>
		<lastmod>2025-07-29T21:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coyote-trojan-turns-accessibility-into-attack-surface/</loc>
		<lastmod>2025-07-29T21:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nimble-gunra-ransomware-evolves-with-linux-variant/</loc>
		<lastmod>2025-07-29T21:36:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-governor-activates-national-guard-after-cyberattack-on-state-capital/</loc>
		<lastmod>2025-07-29T22:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-governor-activates-national-guard-amid-st-paul-cyberattack/</loc>
		<lastmod>2025-07-29T22:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eaid-einladung-zur-online-diskussion-uber-zentralisierung-der-digitalaufsicht/</loc>
		<lastmod>2025-07-29T22:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-life-opfer-eines-cyberangriffs-offenbar-personenbezogene-daten-betroffen/</loc>
		<lastmod>2025-07-29T22:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zahnarzt-praxis-verwaltung-system-pvs-sicherheitslucken-beim-cgm-z1-teil-1/</loc>
		<lastmod>2025-07-29T22:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-sicherheit-die-spezielle-seite-der-neuen-technologie/</loc>
		<lastmod>2025-07-29T22:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-securing-privileged-access-der-schlussel-zur-modernen-unternehmensverteidigung-veroffentlicht/</loc>
		<lastmod>2025-07-29T23:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-caves-to-wyden-agrees-to-release-us-telco-insecurity-report-but-wont-say-when/</loc>
		<lastmod>2025-07-29T23:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vpn-use-surges-as-uk-online-safety-act-takes-effect/</loc>
		<lastmod>2025-07-29T23:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-resilienz-erfordert-einen-ganzheitlichen-ansatz-2/</loc>
		<lastmod>2025-07-30T03:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jsceal-malware-wie-hacker-krypto-wallets-plundern/</loc>
		<lastmod>2025-07-30T04:35:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-meldet-weltweit-grosten-fachkraftemangel-bei-cyber-threat-intelligence/</loc>
		<lastmod>2025-07-30T04:35:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boards-shift-focus-to-tech-and-navigate-cautious-investors/</loc>
		<lastmod>2025-07-30T04:35:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcpsicherheit-das-ruckgrat-von-agentic-ai-sichern/</loc>
		<lastmod>2025-07-30T05:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intent-over-tactics-a-cisos-guide-to-protecting-your-crown-jewels/</loc>
		<lastmod>2025-07-30T05:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cisos-should-rethink-identity-risk-through-attack-paths/</loc>
		<lastmod>2025-07-30T05:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-here-security-still-isnt/</loc>
		<lastmod>2025-07-30T05:36:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-vulnerabilities-allow-attackers-to-hijack-memory-and-run-malicious-code/</loc>
		<lastmod>2025-07-30T05:36:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktiv-ausgenutzt-3-kritische-sicherheitslucken-bei-sysaid/</loc>
		<lastmod>2025-07-30T05:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-automation-to-augmentation-the-future-of-socs-in-enterprise-cybersecurity/</loc>
		<lastmod>2025-07-30T06:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-die-website-einer-stadtverwaltung-in-thuringen-deutschland/</loc>
		<lastmod>2025-07-30T06:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-gewerkschafts-stiftung-in-deutschland/</loc>
		<lastmod>2025-07-30T06:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-webseiten-von-verwaltungen-in-sachsen-anhalt-deutschland/</loc>
		<lastmod>2025-07-30T06:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-zwei-apotheken-ketten-in-russland/</loc>
		<lastmod>2025-07-30T06:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-stadtverwaltung-in-minnesota-usa/</loc>
		<lastmod>2025-07-30T06:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-forschungseinrichtung-von-cyberangriff-betroffen/</loc>
		<lastmod>2025-07-30T06:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-zwischenfall-bei-einem-gesundheitsdienstleister-in-kanada/</loc>
		<lastmod>2025-07-30T06:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesundheitsbehorde-in-kanada-von-cyberangriff-auf-einen-dienstleister-betroffen/</loc>
		<lastmod>2025-07-30T06:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/artemis-open-source-modular-vulnerability-scanner/</loc>
		<lastmod>2025-07-30T06:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-food-supply-chain-has-a-cybersecurity-problem/</loc>
		<lastmod>2025-07-30T06:38:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-llms-vulnerable-to-prompt-based-attacks-leading-to-data-breaches/</loc>
		<lastmod>2025-07-30T06:38:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-microsoft-guidance-targets-defense-against-indirect-prompt-injection/</loc>
		<lastmod>2025-07-30T06:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orange-hit-by-cyberattack-internal-systems-hacked/</loc>
		<lastmod>2025-07-30T06:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-darf-nicht-nerven-nis2-umsetzung-erhoht-den-druck-fur-den-mittelstand/</loc>
		<lastmod>2025-07-30T06:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/codeigniter4-flaw-cve-2025-54418-enables-remote-code-execution-via-file-uploads/</loc>
		<lastmod>2025-07-30T07:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umsetzung-der-nis2-richtlinie-cyberschutz-verpflichtung-fur-firmen-ab-2026/</loc>
		<lastmod>2025-07-30T07:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orange-cyberangriff-trifft-frankreichs-grosten-telco-provider/</loc>
		<lastmod>2025-07-30T07:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alert-fatigue-and-talent-gaps-fuel-appsec-weaknesses/</loc>
		<lastmod>2025-07-30T08:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisos-can-scale-down-without-compromising-security/</loc>
		<lastmod>2025-07-30T08:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prepping-for-the-quantum-threat-requires-a-phased-approach-to-crypto-agility/</loc>
		<lastmod>2025-07-30T08:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-ai-alignment-effort-tackles-unpredictability/</loc>
		<lastmod>2025-07-30T08:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industry-experts-warn-crypto-infrastructure-is-creaking/</loc>
		<lastmod>2025-07-30T08:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senator-warns-of-new-uk-surveillance-risks-to-us-citizens-following-apple-backdoor-row/</loc>
		<lastmod>2025-07-30T08:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-decryptor-released-for-ai-powered-funksec-ransomware/</loc>
		<lastmod>2025-07-30T08:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/african-orgs-fall-to-mass-microsoft-sharepoint-exploits/</loc>
		<lastmod>2025-07-30T08:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-sap-vulnerability-to-breach-linux-systems-and-deploy-auto-color-malware/</loc>
		<lastmod>2025-07-30T08:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-hacker-arrests-halt-attacks-but-copycat-threats-sustain-security-pressure/</loc>
		<lastmod>2025-07-30T08:37:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-launches-agentic-ai-security-guidance/</loc>
		<lastmod>2025-07-30T08:38:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/steigerung-von-angriffsversuchen-und-aggressivere-erpressungstaktiken/</loc>
		<lastmod>2025-07-30T09:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indias-financial-capital-mumbai-suffers-135-million-loss-in-cyber-frauds/</loc>
		<lastmod>2025-07-30T09:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasa-faces-brain-drain-as-thousands-exit-under-voluntary-resignation-scheme/</loc>
		<lastmod>2025-07-30T09:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-sap-flaw-exploited-to-launch-auto-color-malware-attack-on-u-s-company/</loc>
		<lastmod>2025-07-30T09:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-agent-defeats-cloudflares-i-am-not-a-robot-security-check/</loc>
		<lastmod>2025-07-30T09:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/severe-vulnerability-in-ai-vibe-lets-attackers-access-private-user-applications/</loc>
		<lastmod>2025-07-30T09:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-sap-netweaver-to-deploy-new-auto-color-linux-malware/</loc>
		<lastmod>2025-07-30T09:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcttp-2025-wie-sieht-digitale-souveranitat-bei-der-deutschen-bundeswehr-aus/</loc>
		<lastmod>2025-07-30T09:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-threatlabz-report-zeigt-auf-ransomware-lage-verscharft-sich/</loc>
		<lastmod>2025-07-30T09:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-increases-cost-of-data-breaches-report-finds/</loc>
		<lastmod>2025-07-30T10:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/research-shows-data-breach-costs-have-reached-an-all-time-high/</loc>
		<lastmod>2025-07-30T10:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-talos-at-black-hat-2025-briefings-booth-talks-and-what-to-expect/</loc>
		<lastmod>2025-07-30T10:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accuknox-partners-with-cyberknight-to-deliver-zero-trust-security-for-a-leading-global-bank-in-the-uae/</loc>
		<lastmod>2025-07-30T10:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-jsceal-attack-aims-to-steal-credentials-and-wallets-from-crypto-app-users/</loc>
		<lastmod>2025-07-30T10:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-and-fbi-release-tactics-techniques-and-procedures-of-the-scattered-spider-hacker-group/</loc>
		<lastmod>2025-07-30T10:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-launches-dbsc-open-beta-in-chrome-and-enhances-patch-transparency-via-project-zero/</loc>
		<lastmod>2025-07-30T10:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-tops-hit-list-as-396-sharepoint-systems-compromised-globally/</loc>
		<lastmod>2025-07-30T10:38:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-auf-unternehmens-smartphones-apple-intelligence-mit-microsoft-intune-deaktivieren/</loc>
		<lastmod>2025-07-30T10:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lovense-app-fur-sexspielzeuge-leakt-nutzerdaten/</loc>
		<lastmod>2025-07-30T10:38:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-gemini-cli-coding-tool-could-allow-hackers-to-run-nasty-commands/</loc>
		<lastmod>2025-07-30T11:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auto-color-backdoor-targets-u-s-chemical-firm-via-cve-2025-31324/</loc>
		<lastmod>2025-07-30T11:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-is-facing-a-tight-circia-deadline-heres-how-sean-plankey-can-attempt-to-meet-it/</loc>
		<lastmod>2025-07-30T11:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-20-btc-from-chaos-ransomware-affiliate-targeting-texas-firms/</loc>
		<lastmod>2025-07-30T11:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gunra-ransomware-linux-variant-launches-100-encryption-threads-with-partial-encryption-feature/</loc>
		<lastmod>2025-07-30T11:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-costs-fall-for-first-time-in-five-years/</loc>
		<lastmod>2025-07-30T11:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finanzsysteme-in-echtzeit-schutzen-wenn-zahlungen-zur-falle-werden/</loc>
		<lastmod>2025-07-30T11:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raus-aus-der-komfortzone-warum-bei-datensicherheit-keine-checkliste-reicht/</loc>
		<lastmod>2025-07-30T11:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-eyes-20b-cyberark-deal-as-identity-security-takes-center-stage/</loc>
		<lastmod>2025-07-30T12:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-project-zero-to-publicly-announce-bugs-within-a-week-of-reporting-them/</loc>
		<lastmod>2025-07-30T12:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysob-erganzt-sein-portfolio-mit-enterprise-speicherlosungen-fur-anspruchsvolle-workloads/</loc>
		<lastmod>2025-07-30T12:36:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gruppen-haben-innerhalb-eines-jahres-238-tbyte-an-daten-gestohlen/</loc>
		<lastmod>2025-07-30T12:36:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-coach-von-knowbe4-wird-in-microsoft-edge-for-business-integriert/</loc>
		<lastmod>2025-07-30T12:36:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/impossible-hill-to-climb-us-clouds-crush-european-competition-on-their-home-turf/</loc>
		<lastmod>2025-07-30T12:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trickbot-behind-more-than-724-million-in-crypto-theft-and-extortion/</loc>
		<lastmod>2025-07-30T12:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dropbox-passwords-service-ending-export-your-vault-before-oct-28-2025/</loc>
		<lastmod>2025-07-30T12:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-theme-security-vulnerability-enables-to-execute-arbitrary-code-remotely/</loc>
		<lastmod>2025-07-30T12:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-privilege-management-flaw-lets-hackers-escalate-system-access/</loc>
		<lastmod>2025-07-30T12:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-firms-linked-to-silk-typhoon-filed-15-patents-for-cyber-espionage-tools/</loc>
		<lastmod>2025-07-30T12:38:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-walkthrough-a-look-inside-pillars-ai-security-platform/</loc>
		<lastmod>2025-07-30T12:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-safari-vulnerability-also-exploited-as-zero-day-in-google-chrome/</loc>
		<lastmod>2025-07-30T12:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-of-exploited-vulnerabilities-weaponized-within-a-day-of-disclosure/</loc>
		<lastmod>2025-07-30T12:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-hackers-target-maritime-and-shipping-industry-for-ransomware-attacks/</loc>
		<lastmod>2025-07-30T13:39:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-group-enhances-malware-with-new-ottercookie-payload-delivery-technique/</loc>
		<lastmod>2025-07-30T13:39:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-can-use-browser-extensions-to-inject-ai-prompts/</loc>
		<lastmod>2025-07-30T13:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-dahua-camera-flaws-enable-remote-hijack-via-onvif-and-file-upload-exploits/</loc>
		<lastmod>2025-07-30T13:39:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-unter-3-400-it-lern-beleuchtet-cybercrime-lage-teure-angriffe-die-halfte-aller-ransomware-opfer-zahlt-losegeld/</loc>
		<lastmod>2025-07-30T13:40:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-gangstas-paradise-professor-rappt-uber-it-sicherheit/</loc>
		<lastmod>2025-07-30T13:40:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trotz-polizeiaktion-prorussische-hacker-weiten-angriffe-auf-deutschland-aus/</loc>
		<lastmod>2025-07-30T13:40:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-agentic-ai-security-vulnerabilities-expose-enterprise-systems-to-widespread-identity-based-attacks/</loc>
		<lastmod>2025-07-30T13:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-report-sees-drop-in-global-data-breach-costs-except-in-u-s/</loc>
		<lastmod>2025-07-30T13:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erneuter-hackerangriff-bei-orange/</loc>
		<lastmod>2025-07-30T13:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dobrindt-pruft-einsatz-von-us-software-palantir/</loc>
		<lastmod>2025-07-30T13:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-upstart-gunra-goes-cross-platform-with-encryption-upgrades/</loc>
		<lastmod>2025-07-30T13:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/costabreach-report-kosten-von-datenlecks-sinken-in-deutschland-erstmals-seit-funf-jahre/</loc>
		<lastmod>2025-07-30T13:38:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sommerzeit-ist-angriffszeit/</loc>
		<lastmod>2025-07-30T13:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auditmanagement-modul-fur-die-transparente-durchfuhrung-von-audits-nach-iso19011/</loc>
		<lastmod>2025-07-30T13:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-sets-deadline-to-leak-3-5-tb-of-ingram-micro-data/</loc>
		<lastmod>2025-07-30T13:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sharepoint-server-0-day-exploit-targets-african-treasury-companies-and-university/</loc>
		<lastmod>2025-07-30T13:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-multiple-vulnerabilities-including-safari-vulnerability-abused-in-chrome-0-day-attacks/</loc>
		<lastmod>2025-07-30T13:39:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-cyberark-for-25-billion/</loc>
		<lastmod>2025-07-30T14:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-buy-cyberark-for-25b-as-identity-security-takes-center-stage/</loc>
		<lastmod>2025-07-30T14:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-cyberark-for-25b-in-identity-security-push/</loc>
		<lastmod>2025-07-30T14:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-debuts-revamped-channel-program-unleashes-secureworks-siem-partner-opportunity/</loc>
		<lastmod>2025-07-30T14:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decryptor-released-for-funksec-ransomware-avast-works-with-law-enforcement-to-help-victims/</loc>
		<lastmod>2025-07-30T14:37:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alte-datentrager-als-neuware-verkauft-skandal-um-festplatten-im-versandhandel/</loc>
		<lastmod>2025-07-30T14:38:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inc-ransomware-claims-1-2tb-data-breach-at-dollar-tree/</loc>
		<lastmod>2025-07-30T14:38:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-maintainers-alert-users-to-email-verification-phishing-attack/</loc>
		<lastmod>2025-07-30T14:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/its-official-palo-alto-networks-to-buy-cyberark-for-25b/</loc>
		<lastmod>2025-07-30T14:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-management-is-broken-can-a-digital-worker-fix-it/</loc>
		<lastmod>2025-07-30T14:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-governance-practices-are-maturing-and-reshaping-leadership-expectations/</loc>
		<lastmod>2025-07-30T14:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-cuts-vciso-workload-by-68-as-demand-skyrockets-new-report-finds/</loc>
		<lastmod>2025-07-30T14:39:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm-honeypots-can-deceive-threat-actors-into-exposing-binaries-and-known-exploits/</loc>
		<lastmod>2025-07-30T14:39:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-reveal-north-korean-threat-actors-tactics-for-uncovering-illicit-access/</loc>
		<lastmod>2025-07-30T14:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-genai-tools-open-to-man-in-the-prompt-browser-attack/</loc>
		<lastmod>2025-07-30T14:39:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-to-publicly-report-new-vulnerabilities-within-one-week-of-vendor-disclosure/</loc>
		<lastmod>2025-07-30T14:40:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/14-millionen-kunden-gefahrdet-cyberangriff-auf-tochterunternehmen-der-allianz/</loc>
		<lastmod>2025-07-30T14:40:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-altos-acquisition-of-cyberark-could-set-off-a-wave-of-consolidation-in-the-cyber-world/</loc>
		<lastmod>2025-07-30T15:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deploying-gen-ai-guardrails-for-compliance-security-and-trust/</loc>
		<lastmod>2025-07-30T15:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-joint-cyber-defense-collaborative-takes-major-personnel-hit/</loc>
		<lastmod>2025-07-30T15:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/game-changer-how-ai-simplifies-implementation-of-zero-trust-security-objectives/</loc>
		<lastmod>2025-07-30T15:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-aims-to-plant-the-flag-in-agentic-ai-with-cyberark-deal-ceo-nikesh-arora/</loc>
		<lastmod>2025-07-30T15:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-identity-security-provider-cyberark-in-25-billion-deal/</loc>
		<lastmod>2025-07-30T15:38:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-cyberark-for-25-billion-2/</loc>
		<lastmod>2025-07-30T15:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-inks-25b-deal-to-buy-identity-security-shop-cyberark/</loc>
		<lastmod>2025-07-30T15:38:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-releases-mobile-platform-updates-for-ios-and-android/</loc>
		<lastmod>2025-07-30T15:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-lenovo-uefi-firmware-updates-fix-secure-boot-bypass-flaws/</loc>
		<lastmod>2025-07-30T15:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-lnk-files-to-deploy-redloader-malware-on-windows-systems/</loc>
		<lastmod>2025-07-30T15:39:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-spear-phishing-attack-distributes-vip-keylogger-through-email-attachment/</loc>
		<lastmod>2025-07-30T15:39:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hidden-backdoor-found-in-atm-network-via-raspberry-pi/</loc>
		<lastmod>2025-07-30T15:39:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-calls-in-national-guard-after-capital-city-slammed-by-digital-attack/</loc>
		<lastmod>2025-07-30T15:39:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-entdeckt-35-000-betrugerische-werbeanzeigen-fur-krypto-apps-auf-social-media/</loc>
		<lastmod>2025-07-30T15:39:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-trace-to-triage-how-to-connect-product-vulnerabilities-to-security-paths/</loc>
		<lastmod>2025-07-30T16:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-compliance-without-the-chaos-building-it-right-into-your-devops-pipeline/</loc>
		<lastmod>2025-07-30T16:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-one-search-to-rule-them-all-threat-modeling-ai-search/</loc>
		<lastmod>2025-07-30T16:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-kauft-cyberark/</loc>
		<lastmod>2025-07-30T16:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-shuts-down-hundreds-of-russian-pharmacies-disrupts-healthcare-services/</loc>
		<lastmod>2025-07-30T16:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-activates-national-guard-as-cyberattack-on-saint-paul-disrupts-public-services/</loc>
		<lastmod>2025-07-30T16:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/skechers-is-making-kids-shoes-with-a-hidden-airtag-compartment/</loc>
		<lastmod>2025-07-30T16:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-activates-national-guard-over-st-paul-cyberattack/</loc>
		<lastmod>2025-07-30T16:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-security-flaw-exploited-in-chrome-zero-day-attacks/</loc>
		<lastmod>2025-07-30T16:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-uses-tpwsav-sys-driver-to-bypass-edr-security-measures/</loc>
		<lastmod>2025-07-30T16:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-deploy-cobalt-strike-beacon-using-github-and-social-media/</loc>
		<lastmod>2025-07-30T16:38:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-crowdstrike-outage-was-bad-but-it-could-have-been-worse/</loc>
		<lastmod>2025-07-30T16:38:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funksec-ransomware-decryptor-released-free-to-public-after-group-goes-dormant/</loc>
		<lastmod>2025-07-30T16:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hafnium-tied-to-advanced-chinese-surveillance-tools/</loc>
		<lastmod>2025-07-30T16:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/test-sb/</loc>
		<lastmod>2025-07-30T17:38:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/riverdale-local-schools-takes-a-proactive-approach-to-student-safety-and-cybersecurity-in-google-workspace/</loc>
		<lastmod>2025-07-30T17:38:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ethical-ai-what-is-it-key-principles-revealed/</loc>
		<lastmod>2025-07-30T17:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-llm-scrapers-to-ai-agents-mapping-the-ai-bot-landscape-for-detection-teams/</loc>
		<lastmod>2025-07-30T17:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/applying-tenables-risk-based-vulnerability-management-to-the-australian-cyber-security-centres-essential-eight/</loc>
		<lastmod>2025-07-30T17:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-we-know-about-the-cybercrime-group-scattered-spider/</loc>
		<lastmod>2025-07-30T17:39:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plankey-nomination-for-cisa-director-advances-to-senate-floor/</loc>
		<lastmod>2025-07-30T17:39:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-blocks-popular-us-made-internet-speed-test-tool-over-national-security-concerns/</loc>
		<lastmod>2025-07-30T17:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/average-cost-of-a-data-breach-in-us-shoots-to-record-10-million/</loc>
		<lastmod>2025-07-30T17:39:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/users-left-scrambling-for-a-plan-b-as-dropbox-drops-dropbox-passwords/</loc>
		<lastmod>2025-07-30T17:39:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-governor-calls-in-the-troops-after-st-paul-cyberattack/</loc>
		<lastmod>2025-07-30T17:40:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-pledges-to-release-salt-typhoon-report/</loc>
		<lastmod>2025-07-30T17:40:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordvpn-rolls-out-scam-call-protection-for-android-users-in-the-us/</loc>
		<lastmod>2025-07-30T17:40:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-tactics-continue-to-evolve-warn-cyber-cops/</loc>
		<lastmod>2025-07-30T17:40:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-pushes-almost-30-security-fixes-in-mobile-update/</loc>
		<lastmod>2025-07-30T17:40:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ms-authenticator-users-face-passkey-crunch-time/</loc>
		<lastmod>2025-07-30T17:41:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-enabled-security-pushes-down-breach-costs-for-uk-organisations/</loc>
		<lastmod>2025-07-30T17:41:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-insurance-emerging-as-a-compliance-factor/</loc>
		<lastmod>2025-07-30T17:41:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-vendors-back-linux-foundation-agentic-workflows-project/</loc>
		<lastmod>2025-07-30T17:41:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-plant-4g-raspberry-pi-on-bank-network-in-failed-atm-heist/</loc>
		<lastmod>2025-07-30T17:41:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palantir-dobrindt-pruft-einsatz-von-us-sicherheitssoftware/</loc>
		<lastmod>2025-07-30T17:42:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-vulnerability-unprotected-devices/</loc>
		<lastmod>2025-07-30T18:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-gartners-hype-cycle-recognition-signals-the-end-of-legacy-cyber-grc-tools/</loc>
		<lastmod>2025-07-30T18:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-vulnerability-unprotected-api-endpoints-accessed-programmatically/</loc>
		<lastmod>2025-07-30T18:36:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patents-by-silk-typhoon-linked-company-shed-light-on-beijings-offensive-hacking-capabilities/</loc>
		<lastmod>2025-07-30T18:36:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/army-secretary-forces-west-point-to-rescind-appointment-given-to-easterly/</loc>
		<lastmod>2025-07-30T18:36:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-stole-social-security-numbers-during-allianz-life-cyberattack/</loc>
		<lastmod>2025-07-30T18:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprises-neglect-ai-security-and-attackers-have-noticed/</loc>
		<lastmod>2025-07-30T18:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-urges-patch-after-3-major-vpn-vulnerabilities-disclosed/</loc>
		<lastmod>2025-07-30T18:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safepay-ransomware-threatens-to-leak-3-5tb-of-ingram-micro-data/</loc>
		<lastmod>2025-07-30T18:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-actively-exploit-critical-rce-in-wordpress-alone-theme/</loc>
		<lastmod>2025-07-30T18:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-facebook-ads-to-spread-jsceal-malware-via-fake-cryptocurrency-trading-apps/</loc>
		<lastmod>2025-07-30T18:38:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-ceo-5-biggest-statements-on-25b-cyberark-deal/</loc>
		<lastmod>2025-07-30T19:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schools-are-next-for-flock-safetys-automatic-license-place-reader-cameras/</loc>
		<lastmod>2025-07-30T19:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-agrees-to-buy-cyberark-for-25-billion/</loc>
		<lastmod>2025-07-30T19:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germ-brings-endend-encrypted-messages-to-bluesky/</loc>
		<lastmod>2025-07-30T19:36:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-data-breach-costs-rise-as-global-average-falls/</loc>
		<lastmod>2025-07-30T19:36:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixed-a-zero-day-exploited-in-attacks-against-google-chrome-users/</loc>
		<lastmod>2025-07-30T19:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nikesh-arora-why-palo-alto-is-making-a-25b-bet-on-identity/</loc>
		<lastmod>2025-07-30T19:37:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-law-group-data-theft-hacks-affect-282100-patients/</loc>
		<lastmod>2025-07-30T19:37:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/</loc>
		<lastmod>2025-07-30T19:38:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/response-to-cisa-alert-microsoft-releases-guidance-on-exploitation-of-sharepoint-vulnerabilities/</loc>
		<lastmod>2025-07-30T20:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-kubernetes-management-what-is-it-do-you-have-it/</loc>
		<lastmod>2025-07-30T20:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cloud-security-threat-horizons-report-12-is-out/</loc>
		<lastmod>2025-07-30T20:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-next-era-why-agentic-ai-demands-a-new-approach-to-api-security/</loc>
		<lastmod>2025-07-30T20:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-in-the-ai-era-how-do-you-know-this-article-wasnt-written-by-a-machine/</loc>
		<lastmod>2025-07-30T20:36:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/32-of-exploited-vulnerabilities-are-now-zero-days-or-1-days/</loc>
		<lastmod>2025-07-30T20:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dollar-tree-denies-ransomware-claims-says-stolen-data-is-from-defunct-discount-chain/</loc>
		<lastmod>2025-07-30T20:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nationales-umsetzungsgesetz-soll-cybersicherheit-der-deutschen-wirtschaft-starken/</loc>
		<lastmod>2025-07-30T20:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-virtualbox-licensing-tweak-lies-in-wait-for-the-unwary/</loc>
		<lastmod>2025-07-30T20:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-data-breach-costs-go-down-but-not-in-us/</loc>
		<lastmod>2025-07-30T20:37:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/</loc>
		<lastmod>2025-07-30T20:38:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-ubernimmt-cyberarc/</loc>
		<lastmod>2025-07-30T20:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/st-paul-mn-was-hacked-so-badly-that-the-national-guard-has-been-deployed/</loc>
		<lastmod>2025-07-30T21:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-trends-2025-whats-really-coming-for-your-digital-defenses/</loc>
		<lastmod>2025-07-30T21:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-not-every-groundbreaking-idea-needs-to-become-a-billion-dollar-startup/</loc>
		<lastmod>2025-07-30T22:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-replication-crisis/</loc>
		<lastmod>2025-07-30T22:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-buy-cyberark-for-25-billion/</loc>
		<lastmod>2025-07-30T22:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-democrats-call-trump-admins-focus-on-state-voter-rolls-a-pretext-for-disenfranchisement/</loc>
		<lastmod>2025-07-30T22:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reaktionen-von-cgm-auf-meldung-der-sicherheitslucken-beim-z1-pvs-teil-2/</loc>
		<lastmod>2025-07-30T22:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-aus-den-usa-eine-strategische-falle/</loc>
		<lastmod>2025-07-30T22:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaws-found-in-dahua-cameras/</loc>
		<lastmod>2025-07-30T22:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/404-path-not-found-finding-direction-in-a-fickle-job-market/</loc>
		<lastmod>2025-07-30T22:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silk-typhoon-linked-to-powerful-offensive-tools-prc-backed-companies/</loc>
		<lastmod>2025-07-30T22:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-search-of-riches-hackers-plant-4g-enabled-raspberry-pi-in-bank-network/</loc>
		<lastmod>2025-07-30T23:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-428-red-flags-leaked-chats-and-a-final-farewell/</loc>
		<lastmod>2025-07-30T23:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eco-begrust-kabinettsbeschluss-und-moniert-noch-offene-fragen/</loc>
		<lastmod>2025-07-30T23:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-jahr-ai-act-eco-mahnt-rechtssichere-rahmenbedingungen-und-politischen-gestaltungswillen-an/</loc>
		<lastmod>2025-07-30T23:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zuversichtlich-bis-zur-krise-herausforderung-datenresilienz/</loc>
		<lastmod>2025-07-30T23:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devs-are-frustrated-with-ai-coding-tools-that-deliver-nearly-right-solutions/</loc>
		<lastmod>2025-07-30T23:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/improving-cyber-defense-with-nhis/</loc>
		<lastmod>2025-07-31T03:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/budget-friendly-secrets-management-solutions/</loc>
		<lastmod>2025-07-31T03:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sommerzeit-ist-angriffszeit-warum-cybersicherheit-in-der-ferienzeit-besonders-wichtig-ist/</loc>
		<lastmod>2025-07-31T03:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tangled-in-the-web-scattered-spiders-tactics-changing-to-snare-more-victims/</loc>
		<lastmod>2025-07-31T03:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-tells-ingram-micro-pay-up-by-august-1/</loc>
		<lastmod>2025-07-31T03:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-zero-disclosure-policy-change-puts-vendors-on-early-notice/</loc>
		<lastmod>2025-07-31T03:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kabinettsbeschluss-zur-nisrichtlinie/</loc>
		<lastmod>2025-07-31T03:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-tsa-likes-facial-recognition-at-airports-passengers-and-politicians-not-so-much/</loc>
		<lastmod>2025-07-31T03:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/koreans-hacked-blackmailed-by-250-fake-mobile-apps/</loc>
		<lastmod>2025-07-31T03:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/justified-investments-in-iam-tools/</loc>
		<lastmod>2025-07-31T04:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metas-achselzucken-ihr-risiko-wie-facebooks-datenlecks-in-silicon-valley-zur-neuen-normalitat-wurden/</loc>
		<lastmod>2025-07-31T04:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f24-prasentiert-neue-losung-fur-internationales-risikomonitoring-gepaart-mit-smarter-alarmierung/</loc>
		<lastmod>2025-07-31T04:36:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/genai-als-security-gamechanger/</loc>
		<lastmod>2025-07-31T04:36:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-rural-hospitals-are-losing-the-cybersecurity-battle/</loc>
		<lastmod>2025-07-31T04:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-changing-the-vciso-game/</loc>
		<lastmod>2025-07-31T05:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secrets-are-leaking-everywhere-and-bots-are-to-blame/</loc>
		<lastmod>2025-07-31T05:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-announces-25-billion-acquisition-of-cyberark/</loc>
		<lastmod>2025-07-31T05:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-allegedly-breach-nokias-internal-network/</loc>
		<lastmod>2025-07-31T05:36:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ausfall-des-kommunikationsnetzes-cyberangriff-legt-halb-luxemburg-lahm/</loc>
		<lastmod>2025-07-31T05:37:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-ai-system-prompt-hardening/</loc>
		<lastmod>2025-07-31T06:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-wasser-und-abwasserversorgung-in-brasilien/</loc>
		<lastmod>2025-07-31T06:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-amazon-q-prompt-injection-reveals-about-ai-security/</loc>
		<lastmod>2025-07-31T06:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-stolen-credentials-remain-cybercriminals-tool-of-choice/</loc>
		<lastmod>2025-07-31T06:36:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-model-offers-faster-greener-way-for-vulnerability-detection/</loc>
		<lastmod>2025-07-31T06:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crushftp-hit-by-critical-0-day-rce-vulnerability-full-technical-details-and-poc-published/</loc>
		<lastmod>2025-07-31T06:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-in-echtzeit-mit-ki-und-daten-streaming-bedrohungen-erkennen/</loc>
		<lastmod>2025-07-31T06:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hycu-r-cloud-plattform-bietet-umfassende-sichtbarkeit-fur-alle-azure-microsoft-umgebungen/</loc>
		<lastmod>2025-07-31T06:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-jede-zweite-zeile-fehlerhaft-ki-code-voller-sicherheitslucken/</loc>
		<lastmod>2025-07-31T06:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ios-18-6-to-macos-15-6-apple-releases-comprehensive-security-updates/</loc>
		<lastmod>2025-07-31T07:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitssplitter-zum-31-juli-2025/</loc>
		<lastmod>2025-07-31T07:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-exchange-points-are-ignored-vulnerable-and-absent-from-infrastructure-protection-plans/</loc>
		<lastmod>2025-07-31T07:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dahua-camera-flaws-allow-remote-hacking-update-firmware-now/</loc>
		<lastmod>2025-07-31T07:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-released-a-decryptor-for-the-funksec-ransomware/</loc>
		<lastmod>2025-07-31T07:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-und-co-via-duckduckgo-duck-ai-bewahrt-anonymitat-bei-chatbot-anfragen/</loc>
		<lastmod>2025-07-31T07:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaum-erkennbare-malware-lenovo-warnt-vor-gefahrlichen-firmware-lucken/</loc>
		<lastmod>2025-07-31T07:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesetzentwurf-verabschiedet-strengere-kontrollen-fur-einige-it-mitarbeiter-geplant/</loc>
		<lastmod>2025-07-31T07:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mind-the-overconfidence-gap-cisos-and-staff-dont-see-eye-to-eye-on-security-posture/</loc>
		<lastmod>2025-07-31T08:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc2891-hackers-breach-atms-using-raspberry-pi-devices-for-network-access/</loc>
		<lastmod>2025-07-31T08:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-exploit-0-day-flaws-in-retired-netgear-router-and-bitdefender-box/</loc>
		<lastmod>2025-07-31T08:36:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-apt-hackers-compromise-ci-cd-pipelines-to-steal-sensitive-data/</loc>
		<lastmod>2025-07-31T08:36:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-wordpress-theme-flaw-to-hijack-sites-via-remote-plugin-install/</loc>
		<lastmod>2025-07-31T08:37:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/volljahrigkeit-spotify-pruft-alter-mit-gesichtsscans/</loc>
		<lastmod>2025-07-31T08:39:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smarter-protection-faster-response-discover-whats-new-in-our-cyberfraud-protection-platform/</loc>
		<lastmod>2025-07-31T09:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-unbeatable-duo-of-edr-and-microsegmentation-for-threat-containment/</loc>
		<lastmod>2025-07-31T09:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exchange-online-umgeht-egateway-und-stellt-gespoofte-mails-zu/</loc>
		<lastmod>2025-07-31T09:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novablight-masquerades-as-educational-tool-to-steal-login-credentials-and-compromise-crypto-wallets/</loc>
		<lastmod>2025-07-31T09:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-suse-manager-vulnerability-allows-remote-command-execution-as-root/</loc>
		<lastmod>2025-07-31T09:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-200-malicious-open-source-packages-traced-to-lazarus-campaign/</loc>
		<lastmod>2025-07-31T09:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/travel-security-cyberrisiken-auf-geschaftsreisen-reduzieren/</loc>
		<lastmod>2025-07-31T09:38:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/planon-erweitert-sein-managed-services-portfolio/</loc>
		<lastmod>2025-07-31T09:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firewalls-umgangen-hacker-infiltrieren-netzwerk-einer-bank-per-raspberry-pi/</loc>
		<lastmod>2025-07-31T09:38:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ccc-und-gff-verfassungsbeschwerde-gegen-einsatz-von-palantir-software/</loc>
		<lastmod>2025-07-31T09:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-llms-as-a-reverse-engineering-sidekick/</loc>
		<lastmod>2025-07-31T10:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ir-trends-q2-2025-phishing-attacks-persist-as-actors-leverage-compromised-valid-accounts-to-enhance-legitimacy/</loc>
		<lastmod>2025-07-31T10:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-summons-nvidia-over-alleged-backdoor-risks-in-ai-chips/</loc>
		<lastmod>2025-07-31T10:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwordless-future-years-away-despite-microsoft-authenticator-move/</loc>
		<lastmod>2025-07-31T10:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentar-von-daniel-esser-qunis-eu-data-act-unternehmen-brauchen-mehr-als-nur-juristische-compliance/</loc>
		<lastmod>2025-07-31T10:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edr-on-edr-violence-hackers-turn-security-tools-against-each-other/</loc>
		<lastmod>2025-07-31T11:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-silk-typhoon-hackers-file-over-10-patents-for-advanced-intrusive-hacking-tools/</loc>
		<lastmod>2025-07-31T11:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc2891-breaches-atm-network-via-4g-raspberry-pi-tries-caketap-rootkit-for-fraud/</loc>
		<lastmod>2025-07-31T11:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alert-fatigue-data-overload-and-the-fall-of-traditional-siems/</loc>
		<lastmod>2025-07-31T11:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funksec-ransomware-victims-can-now-recover-files-with-free-decryptor/</loc>
		<lastmod>2025-07-31T11:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-nisumsetzung-einen-schritt-weiter/</loc>
		<lastmod>2025-07-31T11:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-cyber-resilience-act-what-you-must-do-before-2027/</loc>
		<lastmod>2025-07-31T12:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-kampagne-uber-proofpoint-link-wrapping/</loc>
		<lastmod>2025-07-31T12:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dahua-uberwachungskameras-mit-sicherheitslucken/</loc>
		<lastmod>2025-07-31T12:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/partnerschaft-mit-databricks-starkt-das-ki-gestutzte-soc-von-arctic-wolf/</loc>
		<lastmod>2025-07-31T12:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/browser-extensions-can-exploit-chatgpt-gemini-in-man-in-the-prompt-attack/</loc>
		<lastmod>2025-07-31T12:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-cyberark-for-25bn/</loc>
		<lastmod>2025-07-31T12:38:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-arrested-for-data-theft-targeting-spanish-bank-customers/</loc>
		<lastmod>2025-07-31T12:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lamehug-first-ai-powered-malware-targets-organizations-via-compromised-official-email-accounts/</loc>
		<lastmod>2025-07-31T12:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bangalore-techie-arrested-for-alleged-role-in-44-million-cryptocurrency-theft/</loc>
		<lastmod>2025-07-31T12:38:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tonic-security-harnesses-ai-to-combat-remediation-challenges/</loc>
		<lastmod>2025-07-31T12:38:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-grabs-iam-provider-cyberark-for-25b/</loc>
		<lastmod>2025-07-31T12:39:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-spooked-after-scattered-spider-arrests/</loc>
		<lastmod>2025-07-31T12:39:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-losegeldzahlungen-unternehmen-noch-verwundbarer-machen/</loc>
		<lastmod>2025-07-31T12:39:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-ransomware-attacke-hacker-setzen-it-groshandler-ingram-micro-unter-druck/</loc>
		<lastmod>2025-07-31T12:39:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/st-paul-mn-was-hacked-so-badly-that-the-national-guard-has-been-deployed-2/</loc>
		<lastmod>2025-07-31T13:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-setzen-ingram-micro-ultimatum/</loc>
		<lastmod>2025-07-31T13:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-legislation-would-direct-federal-agencies-to-fortify-against-quantum-computing-cyber-threats/</loc>
		<lastmod>2025-07-31T13:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-is-experimenting-with-machine-learning-powered-age-estimation-tech-in-the-u-s/</loc>
		<lastmod>2025-07-31T13:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhs-disability-equipment-provider-on-brink-of-collapse-a-year-after-cyberattack/</loc>
		<lastmod>2025-07-31T13:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lenovo-ideacentre-and-yoga-bios-flaws-allow-attackers-to-run-arbitrary-code/</loc>
		<lastmod>2025-07-31T13:38:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/low-code-tools-in-microsoft-azure-allowed-unprivileged-access/</loc>
		<lastmod>2025-07-31T13:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-fbis-strategy-for-prosecuting-ransomware/</loc>
		<lastmod>2025-07-31T13:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-trends-in-endpoint-security-what-the-2025-gartner-magic-quadrant-reveals/</loc>
		<lastmod>2025-07-31T13:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacke-auf-behorden-angriff-legt-uber-30-stadte-und-landkreise-lahm/</loc>
		<lastmod>2025-07-31T13:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-bleibt-ein-akutes-risiko-und-die-lage-spitzt-sich-weiter-zu/</loc>
		<lastmod>2025-07-31T13:39:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/planon-erweitert-seine-managed-service-angebote/</loc>
		<lastmod>2025-07-31T13:39:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-cyberark-fur-25-milliarden-us-dollar-verkauft/</loc>
		<lastmod>2025-07-31T13:39:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-up-179-credential-theft-up-800-2025s-cyber-onslaught-intensifies/</loc>
		<lastmod>2025-07-31T14:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/espionage-costing-australia-8-billion-each-year-warns-intelligence-chief/</loc>
		<lastmod>2025-07-31T14:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-backup-kontrolle-mit-integrierten-immutable-und-datenresilienz-funktionen/</loc>
		<lastmod>2025-07-31T14:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fuhrungsetagen-zu-ki-in-der-cyberabwehr-heute-unsicherheit-morgen-schlusselrolle/</loc>
		<lastmod>2025-07-31T14:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brit-watchdog-pushes-to-rein-in-microsoft-and-aws-with-strategic-market-status/</loc>
		<lastmod>2025-07-31T14:37:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-link-new-ss7-encoding-attack-to-surveillance-vendor-activity/</loc>
		<lastmod>2025-07-31T14:38:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-doubletrouble-banking-malware-targets-users-through-phishing-sites-to-steal-credentials/</loc>
		<lastmod>2025-07-31T14:38:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapores-strategic-approach-to-state-linked-apt-cyber-threats/</loc>
		<lastmod>2025-07-31T14:38:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-coinbase-breach-says-about-insider-risk/</loc>
		<lastmod>2025-07-31T14:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-reading-confidential-funding-the-cve-program-of-the-future/</loc>
		<lastmod>2025-07-31T14:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n-korean-hackers-used-job-lures-cloud-account-access-and-malware-to-steal-millions-in-crypto/</loc>
		<lastmod>2025-07-31T14:39:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacks-escalate-to-physical-threats-against-executives/</loc>
		<lastmod>2025-07-31T14:39:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medien-stammtisch-von-myra-der-wunsch-nach-souveranitat-endet-oft-bei-der-eigenen-it/</loc>
		<lastmod>2025-07-31T14:39:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-resilience-in-the-uncharted-ai-landscape/</loc>
		<lastmod>2025-07-31T15:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/application-layer-attack-investigations-in-minutes-sumo-logic-and-contrast-security/</loc>
		<lastmod>2025-07-31T15:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-ai-in-saas-no-new-playbook-required/</loc>
		<lastmod>2025-07-31T15:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-job-attackers-are-spoofing-emails-with-m365s-direct-send/</loc>
		<lastmod>2025-07-31T15:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/debunking-api-security-myths/</loc>
		<lastmod>2025-07-31T15:37:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cheating-on-quantum-computing-benchmarks/</loc>
		<lastmod>2025-07-31T15:38:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-why-palo-alto-networks-is-the-apple-of-the-cybersecurity-industry/</loc>
		<lastmod>2025-07-31T15:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-open-source-repositories-in-new-espionage-campaign/</loc>
		<lastmod>2025-07-31T15:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silk-typhoon-spun-a-web-of-patents-for-offensive-cyber-tools-report-says/</loc>
		<lastmod>2025-07-31T15:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-a-real-clickfix-attack-how-this-social-engineering-hack-unfolds/</loc>
		<lastmod>2025-07-31T15:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spikes-in-malicious-activity-precede-new-security-flaws-in-80-of-cases/</loc>
		<lastmod>2025-07-31T15:39:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-launches-free-standalone-cross-platform-authenticator-app/</loc>
		<lastmod>2025-07-31T15:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-hackers-exploit-weaponized-google-translate-tools-to-deliver-windows-malware/</loc>
		<lastmod>2025-07-31T15:39:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-unveils-eviction-strategies-tool-to-aid-incident-response/</loc>
		<lastmod>2025-07-31T15:39:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufruf-zum-esicherheitsjahr-2025/</loc>
		<lastmod>2025-07-31T15:39:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-tools-to-automate-and-monitor-your-dmarc-implementation/</loc>
		<lastmod>2025-07-31T16:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-capitalize-on-law-enforcement-takedowns-of-competitors/</loc>
		<lastmod>2025-07-31T16:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industry-groups-urge-vigilance-as-scattered-spider-evolves-tactics/</loc>
		<lastmod>2025-07-31T16:36:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kremlin-monitors-foreign-embassies-in-moscow-through-cyber-espionage-at-isp-level/</loc>
		<lastmod>2025-07-31T16:36:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-unveils-free-thorium-malware-analysis-platform/</loc>
		<lastmod>2025-07-31T16:37:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-affiliated-secret-blizzard-conducting-ongoing-espionage-against-embassies-in-moscow/</loc>
		<lastmod>2025-07-31T16:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kremlin-goons-caught-abusing-isps-to-spy-on-moscow-based-diplomats-microsoft-says/</loc>
		<lastmod>2025-07-31T16:37:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingram-micro-threatened-with-post-ransomware-data-leak/</loc>
		<lastmod>2025-07-31T16:38:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-kremlins-most-devious-hacking-group-is-using-russian-isps-to-plant-spyware/</loc>
		<lastmod>2025-07-31T16:38:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-secret-blizzard-apt-gains-embassy-access-via-isps/</loc>
		<lastmod>2025-07-31T16:38:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/getting-a-cybersecurity-vibe-check-on-vibe-coding/</loc>
		<lastmod>2025-07-31T16:39:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-targets-banking-users-through-discord-channels/</loc>
		<lastmod>2025-07-31T16:39:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-deckt-neue-phishing-kampagne-uber-proofpoint-link-wrapping-auf/</loc>
		<lastmod>2025-07-31T16:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-social-engineering-erfolgreich-wegen-drittsoftware/</loc>
		<lastmod>2025-07-31T16:39:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-forderung-das-nis-2-umsetzungsgesetz-nach-der-sommerpause-endgultig-im-bundestag-zu-verabschieden/</loc>
		<lastmod>2025-07-31T17:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-is-experimenting-with-machine-learning-powered-age-estimation-tech-in-the-us/</loc>
		<lastmod>2025-07-31T17:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beijing-summons-nvidia-over-alleged-backdoors-in-china-bound-ai-chips/</loc>
		<lastmod>2025-07-31T17:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onlyfans-discord-clickfix-themed-pages-spread-epsilon-red-ransomware/</loc>
		<lastmod>2025-07-31T17:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-actively-exploit-critical-zero-day-in-alone-wordpress-theme/</loc>
		<lastmod>2025-07-31T17:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/climb-global-solutions-hints-at-further-ma/</loc>
		<lastmod>2025-07-31T17:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-open-sources-thorium-platform-for-malware-forensic-analysis/</loc>
		<lastmod>2025-07-31T17:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-use-isp-access-to-hack-embassies-in-aitm-attacks/</loc>
		<lastmod>2025-07-31T17:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-detect-multi-layer-redirect-tactic-used-to-steal-microsoft-365-login-credentials/</loc>
		<lastmod>2025-07-31T17:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remediation-vs-reprovisioning-building-resilient-it-systems/</loc>
		<lastmod>2025-07-31T18:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seeing-your-apis-through-an-attackers-eyes-introducing-salt-surface/</loc>
		<lastmod>2025-07-31T18:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-still-trying-to-crack-volt-typhoon-hackers-intentions-goals/</loc>
		<lastmod>2025-07-31T18:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-booker-prize-longlist-and-hacker-summer-camp/</loc>
		<lastmod>2025-07-31T18:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-social-engineering-erfolgreich-wegen-drittanbietersoftware/</loc>
		<lastmod>2025-07-31T18:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-azure-ai-speech-needs-just-seconds-of-audio-to-spit-out-a-convincing-deepfake/</loc>
		<lastmod>2025-07-31T18:38:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-connected-raspberry-pi-to-atm-in-bank-heist-attempt/</loc>
		<lastmod>2025-07-31T18:38:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-now-pays-up-to-40000-for-some-net-vulnerabilities/</loc>
		<lastmod>2025-07-31T18:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anubis-ransomware-targets-android-and-windows-users-to-encrypt-files-and-steal-credentials/</loc>
		<lastmod>2025-07-31T18:38:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-leverage-trickbot-malware-to-steal-us-724-million-in-cryptocurrency/</loc>
		<lastmod>2025-07-31T18:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-things-cfos-need-to-know-about-mitigating-threats/</loc>
		<lastmod>2025-07-31T18:39:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secret-blizzard-deploys-malware-in-isp-level-aitm-attacks-on-moscow-embassies/</loc>
		<lastmod>2025-07-31T18:39:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knp-breach-what-went-wrong-with-identity-and-saas-controls/</loc>
		<lastmod>2025-07-31T19:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unlocking-secure-data-utility-the-tonic-ai-and-databricks-partnership-and-integration/</loc>
		<lastmod>2025-07-31T19:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blame-the-governor-oklahomas-board-meeting-porn-scandal-goes-gonzo/</loc>
		<lastmod>2025-07-31T19:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingram-micro-partners-concerned-about-claimed-safepay-data-theft/</loc>
		<lastmod>2025-07-31T19:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/biotech-contractor-settles-for-9-8-million-with-doj-over-alleged-cybersecurity-lapses/</loc>
		<lastmod>2025-07-31T19:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-linux-can-now-run-in-apple-containers-on-macos-systems/</loc>
		<lastmod>2025-07-31T19:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-disable-excel-workbook-links-to-blocked-file-types/</loc>
		<lastmod>2025-07-31T19:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unit-42-launches-attribution-framework-to-classify-threat-actors-by-behavior-and-activity/</loc>
		<lastmod>2025-07-31T19:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-malicious-rmm-tools-for-stealthy-initial-access-to-organizations/</loc>
		<lastmod>2025-07-31T19:38:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-code-why-your-next-full-stack-hire-should-think-like-a-product-owner/</loc>
		<lastmod>2025-07-31T20:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-im-visier-cyberkriminelle-knacken-mfa/</loc>
		<lastmod>2025-07-31T20:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-ransomware-gangs-threaten-physical-harm-i-am-afraid-of-whats-next-ex-negotiator-says/</loc>
		<lastmod>2025-07-31T20:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gene-scanner-pays-9-8-million-to-get-feds-off-its-back-in-security-flap/</loc>
		<lastmod>2025-07-31T20:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-claims-mailchimp-as-new-victim-in-relatively-small-breach/</loc>
		<lastmod>2025-07-31T20:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-did-china-have-a-sneak-peek-into-toolshell/</loc>
		<lastmod>2025-07-31T20:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransom-cartel-profits-off-rivals-demise/</loc>
		<lastmod>2025-07-31T20:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safepay-claims-ingram-micro-breach-sets-ransom-deadline/</loc>
		<lastmod>2025-07-31T20:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-veo-2-ai-video-model-priced-at-0-50-per-second/</loc>
		<lastmod>2025-07-31T21:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-secret-blizzard-targets-foreign-embassies-in-moscow-with-apolloshadow-malware/</loc>
		<lastmod>2025-07-31T21:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-woo-x-probes-14m-breach/</loc>
		<lastmod>2025-07-31T21:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-cyberark-deal-is-different-from-past-palo-alto-ma/</loc>
		<lastmod>2025-07-31T21:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gen-z-falls-for-scams-2x-more-than-older-generations/</loc>
		<lastmod>2025-07-31T21:36:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/external-attack-surface-management-the-complete-guide/</loc>
		<lastmod>2025-07-31T22:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-run-a-firewall-test-a-guide-for-enterprises/</loc>
		<lastmod>2025-07-31T22:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/symmetric-cryptography-in-practice-a-developers-guide-to-key-management/</loc>
		<lastmod>2025-07-31T22:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-catches-russian-hackers-targeting-foreign-embassies/</loc>
		<lastmod>2025-07-31T22:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vergleich-microsoft-defender-for-office-365-zu-ices-software-von-drittanbietern/</loc>
		<lastmod>2025-07-31T22:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korrekturen-des-z1-pvs-durch-cgm-und-aktueller-stand-teil-3/</loc>
		<lastmod>2025-07-31T22:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-data-plan-aims-to-make-health-technology-great-again/</loc>
		<lastmod>2025-07-31T22:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wallarm-secures-55m-to-safeguard-api-driven-business-logic/</loc>
		<lastmod>2025-07-31T22:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-telephone-phish/</loc>
		<lastmod>2025-07-31T23:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-lets-talk-about-the-ai-apocalypse/</loc>
		<lastmod>2025-07-31T23:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-wrap-phishing-links-through-url-scanning-services-to-bypass-detection/</loc>
		<lastmod>2025-07-31T23:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gtia-ceo-dan-wensley-from-cybersecurity-to-ai-msps-are-navigating-seismic-shifts/</loc>
		<lastmod>2025-07-31T23:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisregierungsentwurf-claudia-plattner-wurdigt-grosen-schritt-auf-dem-weg-zur-cybernation/</loc>
		<lastmod>2025-07-31T23:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dora-europaische-union-prazisiert-umgang-mit-lieferketten-risiken/</loc>
		<lastmod>2025-07-31T23:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sensitive-data-in-text-embeddings-is-recoverable/</loc>
		<lastmod>2025-08-01T03:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-im-fadenkreuz-so-umgehen-hacker-die-mfa/</loc>
		<lastmod>2025-08-01T03:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-fuhrt-zu-hoherer-cybersicherheit-in-der-deutschen-wirtschaft/</loc>
		<lastmod>2025-08-01T03:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-bright-are-ai-agents-not-very-recent-reports-suggest/</loc>
		<lastmod>2025-08-01T03:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-state-hackers-spy-on-moscow-embassies-via-isp-level-aitm-attacks/</loc>
		<lastmod>2025-08-01T03:36:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thailand-plotzlich-totales-drohnen-verbot-verhangt/</loc>
		<lastmod>2025-08-01T03:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-der-kabinettsbeschluss-ist-da-und-lasst-einige-fragen-offen/</loc>
		<lastmod>2025-08-01T04:37:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinellabs-uncovers-chinas-hidden-cyber-espionage-arsenal/</loc>
		<lastmod>2025-08-01T04:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec-products-of-the-month-july-2025/</loc>
		<lastmod>2025-08-01T04:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/review-cisa-certified-information-systems-auditor-practice-tests/</loc>
		<lastmod>2025-08-01T05:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-gaps-still-haunt-shared-mobile-device-use-in-healthcare/</loc>
		<lastmod>2025-08-01T05:36:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-unveils-salt-surface-to-expose-hidden-api-risks/</loc>
		<lastmod>2025-08-01T05:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/review-cisa-certified-information-systems-auditor-practice-tests-2/</loc>
		<lastmod>2025-08-01T05:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-payment-bans-prevention-strategy-or-misguided-policy/</loc>
		<lastmod>2025-08-01T05:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-gaps-still-haunt-shared-mobile-device-use-in-healthcare-2/</loc>
		<lastmod>2025-08-01T05:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-17000-sharepoint-servers-found-exposed-online-840-vulnerable-to-active-0-day-attacks/</loc>
		<lastmod>2025-08-01T05:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwei-neue-insolvenzantrage-cyberattacken-treiben-deutsche-unternehmen-in-den-ruin/</loc>
		<lastmod>2025-08-01T05:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-best-wordpress-security-plugins-in-2025/</loc>
		<lastmod>2025-08-01T06:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-einen-anbieter-von-warme-und-energietechnik-in-der-schweiz/</loc>
		<lastmod>2025-08-01T06:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-ein-museum-in-frankreich/</loc>
		<lastmod>2025-08-01T06:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-eine-kreisverwaltung-in-sachsen-anhalt-deutschland/</loc>
		<lastmod>2025-08-01T06:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-offentlich-rechtliche-rundfunkanstalt-in-irland/</loc>
		<lastmod>2025-08-01T06:36:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/its-time-to-sound-the-alarm-on-water-sector-cybersecurity/</loc>
		<lastmod>2025-08-01T06:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-attackers-know-about-your-company-thanks-to-ai/</loc>
		<lastmod>2025-08-01T06:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-upgrades-net-bounty-program-offers-rewards-up-to-40000/</loc>
		<lastmod>2025-08-01T06:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-edr-free-trials-to-bypass-endpoint-protection/</loc>
		<lastmod>2025-08-01T06:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-thorium-open-source-malware-and-forensics-tool-now-public/</loc>
		<lastmod>2025-08-01T06:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-betrugsmasche-bedroht-unternehmen-eine-angebotsanfrage-die-man-nicht-ablehnen-kann/</loc>
		<lastmod>2025-08-01T06:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/summer-why-cybersecurity-must-be-strengthened-as-vacations-abound/</loc>
		<lastmod>2025-08-01T07:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metamask-warnung-an-logitech-partner-angeblich-sicherheitsvorfall/</loc>
		<lastmod>2025-08-01T07:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-spy-says-linkedin-profiles-that-list-defence-work-recklessly-invite-attention-of-foreign-intelligence-services/</loc>
		<lastmod>2025-08-01T07:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-steps-to-keep-your-ai-future-ready/</loc>
		<lastmod>2025-08-01T07:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-rusten-sich-fur-post-quantum-kryptografie-fortschritte-im-quantenrechnen-rucken-pqc-auf-die-agenda/</loc>
		<lastmod>2025-08-01T07:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deal-uber-rund-25-milliarden-us-dollar-palo-alto-networks-ubernimmt-cyberark/</loc>
		<lastmod>2025-08-01T07:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-umfrage-zur-ki-in-der-cyberabwehr-zwischen-zuruckhaltung-und-zukunftshoffnung/</loc>
		<lastmod>2025-08-01T07:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-proton-bringt-eigene-authenticator-app-auf-den-markt/</loc>
		<lastmod>2025-08-01T07:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staatliche-akteure-hacker-infiltrieren-botschaften-in-russland-uber-provider/</loc>
		<lastmod>2025-08-01T07:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einfallstor-fur-hacker-tausende-ki-server-ungeschutzt/</loc>
		<lastmod>2025-08-01T08:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sicherheitslucke-in-deutschland-weit-verbreitet/</loc>
		<lastmod>2025-08-01T08:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/40000-wordpress-websites-at-risk-of-being-hijacked-due-to-vulnerable-post-smtp-plugin/</loc>
		<lastmod>2025-08-01T08:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-ai-engine-plugin-bug-allows-remote-code-execution-update-now/</loc>
		<lastmod>2025-08-01T08:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lack-of-visibility-isnt-the-problem-its-what-happens-next-that-should-worry-you/</loc>
		<lastmod>2025-08-01T09:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-threats-rache-ist-nicht-das-einzige-motiv/</loc>
		<lastmod>2025-08-01T09:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-released-thorium-platform-to-support-malware-and-forensic-analysis/</loc>
		<lastmod>2025-08-01T09:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-leads-the-way-with-15m-ai-alignment-project/</loc>
		<lastmod>2025-08-01T09:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-gartner-digitale-souveranitat-ist-nahezu-unmoglich/</loc>
		<lastmod>2025-08-01T09:36:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-verandert-die-spielregeln-ein-kabinettsbeschluss-unter-druck/</loc>
		<lastmod>2025-08-01T09:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-stellt-seinen-ransomware-report-q2-2025-vor/</loc>
		<lastmod>2025-08-01T09:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gaining-independence-with-advanced-pam/</loc>
		<lastmod>2025-08-01T10:36:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exciting-developments-in-nhidr/</loc>
		<lastmod>2025-08-01T10:36:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsrisiko-mensch-so-schutzen-unternehmen-ihre-daten/</loc>
		<lastmod>2025-08-01T10:37:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-edr-edr-aushebelt/</loc>
		<lastmod>2025-08-01T10:37:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrooks-attached-raspberry-pi-to-bank-network-and-drained-atm-cash/</loc>
		<lastmod>2025-08-01T10:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-block-external-workbook-links-to-unsafe-file-types-by-default/</loc>
		<lastmod>2025-08-01T10:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-0-click-rce-exploit-worth-1-million-at-pwn2own-ireland-2025/</loc>
		<lastmod>2025-08-01T10:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2603-deploys-dns-controlled-backdoor-in-warlock-and-lockbit-ransomware-attacks/</loc>
		<lastmod>2025-08-01T10:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-regularly-exploit-vulnerabilities-before-public-disclosure-study-finds/</loc>
		<lastmod>2025-08-01T10:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staggering-800-rise-in-infostealer-credential-theft/</loc>
		<lastmod>2025-08-01T10:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kostenlose-datenrettung-fur-linux-dateisysteme-r-linux-freie-linux-recovery-software/</loc>
		<lastmod>2025-08-01T10:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-veroffentlicht-seinen-cloud-defense-report-2025/</loc>
		<lastmod>2025-08-01T10:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-wordpress-plugin-daten-aller-pi-hole-spender-geleakt/</loc>
		<lastmod>2025-08-01T10:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-ki-in-der-cyberabwehr-heute-unsicherheit-morgen-schlusselrolle/</loc>
		<lastmod>2025-08-01T10:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spotlight-report-how-ai-is-reshaping-it/</loc>
		<lastmod>2025-08-01T11:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-stellt-keith-bird-als-executive-vice-president-of-international-growth-ein/</loc>
		<lastmod>2025-08-01T11:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-lambda-loves-charging-for-idle-time-vercel-claims-it-found-a-way-to-dodge-the-bill/</loc>
		<lastmod>2025-08-01T11:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pwn2own-hacking-contest-pays-1-million-for-whatsapp-exploit/</loc>
		<lastmod>2025-08-01T11:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-hackers-target-indian-railways-oil-and-government-systems-using-malicious-pdf-files/</loc>
		<lastmod>2025-08-01T11:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-proofpoint-and-intermedia-link-wrapping-to-conceal-phishing-payloads/</loc>
		<lastmod>2025-08-01T11:38:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secret-blizzard-targets-moscow-based-embassies-in-new-espionage-campaign/</loc>
		<lastmod>2025-08-01T11:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/update-zu-nis2-neuer-nis2-entwurf-mehr-unternehmen-von-richtlinie-betroffen/</loc>
		<lastmod>2025-08-01T11:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/galaxy-s26-pro-statt-standard-plant-samsung-den-kompletten-umbau-seiner-flaggschiff-strategie/</loc>
		<lastmod>2025-08-01T11:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spielerisch-gehackt-forscher-umgeht-chatgpt-schutz-und-kassiert-echte-windows-lizenzen/</loc>
		<lastmod>2025-08-01T11:38:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-meets-ransomware-a-new-cyber-threat/</loc>
		<lastmod>2025-08-01T12:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrooks-faked-microsoft-oauth-apps-for-mfa-phishing/</loc>
		<lastmod>2025-08-01T12:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/luxembourg-probes-reported-attack-on-huawei-tech-that-caused-nationwide-telecoms-outage/</loc>
		<lastmod>2025-08-01T12:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-verandert-die-spielregeln-ein-kabinettsbeschluss-unter-druck-2/</loc>
		<lastmod>2025-08-01T12:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudreport-2025-das-neue-fundament-der-cloud-sicherheit-steht-auf-drei-saulen/</loc>
		<lastmod>2025-08-01T12:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toolshell-under-siege-check-point-analyzes-chinese-apt-storm-2603/</loc>
		<lastmod>2025-08-01T12:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illumina-fined-9-8m-for-cybersecurity-flaws-in-genomic-tools-sold-to-u-s-agencies/</loc>
		<lastmod>2025-08-01T12:38:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/search-engines-are-indexing-chatgpt-chats-heres-what-our-osint-found/</loc>
		<lastmod>2025-08-01T12:38:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-impersonate-microsoft-oauth-apps-to-steal-login-credentials/</loc>
		<lastmod>2025-08-01T12:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-boost-offensive-rd-by-identifying-and-exploiting-trapped-com-objects/</loc>
		<lastmod>2025-08-01T12:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/siems-dying-a-slow-death-or-poised-for-ai-rebirth/</loc>
		<lastmod>2025-08-01T12:39:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-are-what-you-eat-why-your-ai-security-tools-are-only-as-strong-as-the-data-you-feed-them/</loc>
		<lastmod>2025-08-01T12:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nrs-healthcare-groser-gesundheitsausruster-geht-nach-cyberangriff-pleite/</loc>
		<lastmod>2025-08-01T12:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-uk-smbs-can-handle-sensitive-information-without-breaking-the-law-or-the-bank/</loc>
		<lastmod>2025-08-01T13:38:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spying-on-people-through-airportr-luggage-delivery-service/</loc>
		<lastmod>2025-08-01T13:38:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massives-banken-phishing-uber-weebly-plattform/</loc>
		<lastmod>2025-08-01T13:38:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-report-erpressungsversuche-werden-gezielter-und-verhandlungen-uber-losegeld-aggressiver/</loc>
		<lastmod>2025-08-01T13:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/florida-prison-email-blunder-exposes-visitor-contact-info-to-inmates/</loc>
		<lastmod>2025-08-01T13:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-adds-silent-60-second-test-call-feature-for-it-admins/</loc>
		<lastmod>2025-08-01T13:38:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-shade-bios-technique-beats-every-kind-of-security/</loc>
		<lastmod>2025-08-01T13:38:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-free-thorium-malware-analysis-tool/</loc>
		<lastmod>2025-08-01T13:39:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-generated-malicious-npm-package-drains-solana-funds-from-1500-before-takedown/</loc>
		<lastmod>2025-08-01T13:39:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maximale-sicherheit-fur-12-000-postfacher/</loc>
		<lastmod>2025-08-01T13:39:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-completes-red-canary-acquisition-for-major-secops-push/</loc>
		<lastmod>2025-08-01T14:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-mobile-internet-shutdowns-hit-record-high-amid-ukrainian-drone-attacks/</loc>
		<lastmod>2025-08-01T14:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-accuses-us-of-exploiting-microsoft-zero-day-in-cyberattack/</loc>
		<lastmod>2025-08-01T14:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-seize-blacksuit-ransomware-gangs-servers/</loc>
		<lastmod>2025-08-01T14:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rezept-fur-eine-katastrophe-malware-in-koch-app/</loc>
		<lastmod>2025-08-01T14:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-ai-startup-fundable-from-a-vc-who-knows/</loc>
		<lastmod>2025-08-01T14:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blizzard-groups-apolloshadow-malware-installs-root-certificates-to-trust-malicious-sites/</loc>
		<lastmod>2025-08-01T14:38:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-ransomware-2025-von-sophos-die-halfte-aller-unternehmen-zahlt-losegeld/</loc>
		<lastmod>2025-08-01T14:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comp-ai-secures-2-6m-pre-seed-to-disrupt-soc-2-market/</loc>
		<lastmod>2025-08-01T15:37:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-i-joined-tonic-ai-a-software-engineers-perspective/</loc>
		<lastmod>2025-08-01T15:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-reaches-9-8-million-settlement-with-illumina-over-cyber-whistleblower-claims/</loc>
		<lastmod>2025-08-01T15:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flo-settles-class-action-lawsuit-alleging-improper-data-sharing/</loc>
		<lastmod>2025-08-01T15:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sex-toy-maker-lovense-threatens-legal-action-after-fixing-security-flaws-that-exposed-users-data/</loc>
		<lastmod>2025-08-01T15:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comp-ai-secures-2-6m-pre-seed-to-disrupt-soc-2-market-2/</loc>
		<lastmod>2025-08-01T15:38:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-cursor-ide-vulnerable-to-prompt-injection-attacks/</loc>
		<lastmod>2025-08-01T15:38:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-threat-actors-hack-11000-android-devices-to-deploy-playpraetor-malware/</loc>
		<lastmod>2025-08-01T15:38:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-microsoft-365s-direct-send-feature-for-internal-phishing-attacks/</loc>
		<lastmod>2025-08-01T15:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-the-perfect-post-security-incident-review-playbook/</loc>
		<lastmod>2025-08-01T15:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/male-dominated-cyber-industry-still-holds-space-for-women-with-resilience/</loc>
		<lastmod>2025-08-01T15:39:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-fake-oauth-apps-with-tycoon-kit-to-breach-microsoft-365-accounts/</loc>
		<lastmod>2025-08-01T15:39:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/koske-marks-a-significant-step-in-ai-created-malware-aqua-security/</loc>
		<lastmod>2025-08-01T16:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/200-days-until-200-days-everything-you-need-to-know-about-the-first-stepdown-in-maximum-certificate-lifespan-validity/</loc>
		<lastmod>2025-08-01T16:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-leak-purported-aeroflot-data-as-russia-denies-breach/</loc>
		<lastmod>2025-08-01T16:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-agentic-identities-focus-of-palo-altos-cyberark-buy/</loc>
		<lastmod>2025-08-01T16:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pi-hole-discloses-data-breach-via-givewp-wordpress-plugin-flaw/</loc>
		<lastmod>2025-08-01T16:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockbit-operators-use-stealthy-dll-sideloading-to-mask-malicious-app-as-legitimate-one/</loc>
		<lastmod>2025-08-01T16:38:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-hackers-weaponize-234-npm-and-pypi-packages-to-infect-developers/</loc>
		<lastmod>2025-08-01T16:38:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2603-deploys-custom-malware-using-byovd-to-bypass-endpoint-protections/</loc>
		<lastmod>2025-08-01T16:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-ai-generated-code-remains-wildly-insecure/</loc>
		<lastmod>2025-08-01T16:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-0-0-0-0-day-exploiting-localhost-apis-from-the-browser/</loc>
		<lastmod>2025-08-01T17:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-rag-models-work-in-ai-based-vulnerability-scanner/</loc>
		<lastmod>2025-08-01T17:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-offers-1m-bounty-at-pwn2own-ireland-2025-for-whatsapp-exploits/</loc>
		<lastmod>2025-08-01T17:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-can-hack-smart-contracts-on-autopilot/</loc>
		<lastmod>2025-08-01T17:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pi-hole-discloses-data-breach-triggered-by-wordpress-plugin-flaw/</loc>
		<lastmod>2025-08-01T17:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-sees-surge-after-collapse-of-dominant-ransomhub-raas/</loc>
		<lastmod>2025-08-01T17:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isc2-launches-new-security-certificate-for-ai-expertise/</loc>
		<lastmod>2025-08-01T17:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-preps-biometric-checks-for-foreign-visitors/</loc>
		<lastmod>2025-08-01T18:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-attacks-surged-this-past-year-palo-alto-networks-report-finds/</loc>
		<lastmod>2025-08-01T18:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharepoint-zero-day-exploit-cve-2025-53770-network-infrastructure-mapping/</loc>
		<lastmod>2025-08-01T18:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-spy-says-linkedin-profiles-that-list-defense-work-recklessly-invite-attention-of-foreign-intelligence-services/</loc>
		<lastmod>2025-08-01T18:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/view-to-a-patch-google-tweaks-its-vulnerability-disclosure/</loc>
		<lastmod>2025-08-01T18:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-firewall-devices-hit-in-surge-of-akira-ransomware-attacks/</loc>
		<lastmod>2025-08-01T18:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safepay-ransomware-strikes-260-victims-across-multiple-countries/</loc>
		<lastmod>2025-08-01T18:38:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-ai-code-editor-fixed-flaw-allowing-attackers-to-run-commands-via-prompt-injection/</loc>
		<lastmod>2025-08-01T18:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-custom-database-software-matters-in-2025/</loc>
		<lastmod>2025-08-01T19:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ip-networks-improve-online-gaming/</loc>
		<lastmod>2025-08-01T19:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/response-to-cisa-advisory-aa25-212a-cisa-and-uscg-identify-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-at-us-critical-infrastructure-organization/</loc>
		<lastmod>2025-08-01T19:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharepoint-zero-day-exploit-toolshell-network-infrastructure-mapping/</loc>
		<lastmod>2025-08-01T19:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-says-us-spies-exploited-microsoft-exchange-zero-day-to-steal-military-info/</loc>
		<lastmod>2025-08-01T19:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/met-police-to-double-facial-recognition-use-amid-budget-cuts/</loc>
		<lastmod>2025-08-01T19:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-genai-application-security-not-just-prompt-injection/</loc>
		<lastmod>2025-08-01T20:39:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-certificate-discovery-made-easy-with-appviewx-application-connectors/</loc>
		<lastmod>2025-08-01T20:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursors-ai-coding-agent-morphed-into-local-shell-with-one-line-prompt-attack/</loc>
		<lastmod>2025-08-01T20:39:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-still-writing-vulnerable-code/</loc>
		<lastmod>2025-08-01T20:39:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-legal-woes-continue-to-mount-over-health-data-trackers/</loc>
		<lastmod>2025-08-01T20:40:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-reading-news-desk-turns-10-back-at-black-hat-usa-for-2025/</loc>
		<lastmod>2025-08-01T20:40:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-backlog-at-the-commerce-department-is-reportedly-stalling-nvidias-h20-chip-licenses/</loc>
		<lastmod>2025-08-01T21:39:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-removes-chatgpt-self-doxing-option/</loc>
		<lastmod>2025-08-01T21:39:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-may-be-testing-a-cheaper-paid-plan-for-chatgpt/</loc>
		<lastmod>2025-08-01T21:39:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-spike-linked-to-potential-zero-day-flaw-in-sonicwall-devices/</loc>
		<lastmod>2025-08-01T22:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-2025-latest-news-and-insights/</loc>
		<lastmod>2025-08-01T22:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dsgvo-und-nis-2-konnen-und-sollten-hand-in-hand-gehen/</loc>
		<lastmod>2025-08-01T22:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsvorfalle-zugriffe-durch-dritte-werden-zur-achillesferse/</loc>
		<lastmod>2025-08-01T22:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-toolshell-exploit-blurs-crime-and-espionage/</loc>
		<lastmod>2025-08-01T22:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safe-raises-70m-series-c-to-scale-cyber-risk-management/</loc>
		<lastmod>2025-08-01T22:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/genomics-gear-firm-pays-9-8m-to-settle-false-cyber-claims/</loc>
		<lastmod>2025-08-01T22:38:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noma-raised-100m-to-expand-agentic-ai-security-platform/</loc>
		<lastmod>2025-08-01T22:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/penetration-testing-methodology-step-by-step-breakdown-for-2025/</loc>
		<lastmod>2025-08-01T23:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberresilienz-als-strategischer-imperativ-der-unternehmen/</loc>
		<lastmod>2025-08-01T23:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-ai-generated-npm-package-hits-solana-users/</loc>
		<lastmod>2025-08-01T23:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-week-of-the-online-safety-act-cyber-experts-weigh-in/</loc>
		<lastmod>2025-08-01T23:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-and-aiops-the-role-of-grc-in-it-operations/</loc>
		<lastmod>2025-08-02T03:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-one-jetzt-mit-uber-300-integrationen-die-offenste-exposure-management-plattform-der-sicherheitsbranche/</loc>
		<lastmod>2025-08-02T03:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-vegas-gems-for-black-hat-2025/</loc>
		<lastmod>2025-08-02T04:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tonic-ai-product-updates-may-2024/</loc>
		<lastmod>2025-08-02T05:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freedom-to-choose-secure-cloud-services/</loc>
		<lastmod>2025-08-02T06:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-free-tools-enough-for-nhi-security/</loc>
		<lastmod>2025-08-02T06:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delivering-value-with-efficient-nhis/</loc>
		<lastmod>2025-08-02T06:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adaptable-security-in-an-evolving-cloud-landscape/</loc>
		<lastmod>2025-08-02T06:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrug-mit-manipulierten-rechnungen-ein-neuer-fall-ein-neuer-trend/</loc>
		<lastmod>2025-08-02T07:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-exploits-sonicwall-vpns-in-likely-zero-day-attack-on-fully-patched-devices/</loc>
		<lastmod>2025-08-02T07:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cmmc-assessor-faq-what-can-you-expect-from-them/</loc>
		<lastmod>2025-08-02T08:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-roasts-unnamed-critical-national-infrastructure-body-for-shoddy-security-hygiene/</loc>
		<lastmod>2025-08-02T09:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-says-openai-engineers-using-claude-code-ahead-of-gpt-5-launch/</loc>
		<lastmod>2025-08-02T09:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-exploits-0-day-vulnerability-in-sonicwall-firewall-devices/</loc>
		<lastmod>2025-08-02T09:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-7-best-encryption-software-choices-in-2025/</loc>
		<lastmod>2025-08-02T10:41:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-agencies-warn-of-surging-interlock-ransomware-attacks-targeting-healthcare-businesses/</loc>
		<lastmod>2025-08-02T10:41:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-blames-china-based-threat-actor-for-sharepoint-attacks/</loc>
		<lastmod>2025-08-02T10:41:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-confirms-security-breach-by-extortion-group-calls-stolen-data-fake-2/</loc>
		<lastmod>2025-08-02T10:41:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-prepares-new-open-weight-models-along-with-gpt-5/</loc>
		<lastmod>2025-08-02T10:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-undetectable-plague-malware-targeting-linux-servers-for-persistent-ssh-access/</loc>
		<lastmod>2025-08-02T10:42:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cybersecurity-should-be-a-board-level-priority-in-every-company-perspective-from-serhii-mikhalap/</loc>
		<lastmod>2025-08-02T10:38:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-investigates-nvidias-h20-chips-for-surveillance-risks/</loc>
		<lastmod>2025-08-02T10:38:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-zero-day-exploit-targeting-google-chrome-users/</loc>
		<lastmod>2025-08-02T10:38:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-vulnerability-that-let-anyone-hide-search-results/</loc>
		<lastmod>2025-08-02T10:38:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-report-shadow-ai-and-poor-governance-linked-to-costlier-breaches-in-2025/</loc>
		<lastmod>2025-08-02T10:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-platforms-vulnerability-could-have-affected-every-app-built-on-it/</loc>
		<lastmod>2025-08-02T10:39:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emergency-response-to-cyberattack-in-minnesota-now-includes-national-guard/</loc>
		<lastmod>2025-08-02T10:39:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-30m-cybersecurity-ai-and-why-experts-say-it-could-fail-spectacularly/</loc>
		<lastmod>2025-08-02T10:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-general-purpose-ai-rulebook-whats-covered-which-tech-giants-will-sign-it/</loc>
		<lastmod>2025-08-02T10:39:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-authenticator-users-your-passwords-could-be-inaccessible-soon-act-by-aug-1/</loc>
		<lastmod>2025-08-02T10:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cloud-threat-actors-increasingly-target-backups-take-these-steps-now/</loc>
		<lastmod>2025-08-02T10:40:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sploitlight-vulnerability-how-hackers-bypassed-apples-tcc-protections/</loc>
		<lastmod>2025-08-02T10:40:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cloud-forrester-report-top-challenges-to-effective-threat-intelligence/</loc>
		<lastmod>2025-08-02T10:40:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-exposes-amazon-q-security-flaws-using-covert-code/</loc>
		<lastmod>2025-08-02T10:40:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-turns-panda-image-into-new-breed-of-persistent-malware/</loc>
		<lastmod>2025-08-02T10:40:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sharepoint-hackers-switch-gears-to-spread-ransomware-2/</loc>
		<lastmod>2025-08-02T10:41:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/werbung-in-alexa-amazon-mochte-mit-dem-ki-assistenten-viel-geld-verdienen/</loc>
		<lastmod>2025-08-02T11:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-will-use-ai-to-guess-peoples-ages-based-on-search-history/</loc>
		<lastmod>2025-08-02T11:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-affiliate-panel-login-credentials-exposed-online/</loc>
		<lastmod>2025-08-02T11:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peter-thiel-bundesjustizministerin-geht-auf-distanz-zu-palantir-software/</loc>
		<lastmod>2025-08-02T11:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundes-trojaner-reloaded-dobrindt-will-bundespolizei-zum-hackerstaat-machen/</loc>
		<lastmod>2025-08-02T12:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-government-begins-200m-payouts-to-backpage-trafficking-victims/</loc>
		<lastmod>2025-08-02T12:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-security-guide-for-critical-infrastructure/</loc>
		<lastmod>2025-08-02T13:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polyworking/</loc>
		<lastmod>2025-08-02T14:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-plague-pam-backdoor-exposes-critical-linux-systems-to-silent-credential-theft/</loc>
		<lastmod>2025-08-02T15:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategic-reel-proactive-by-design-fortinet-retools-network-defense-for-real-time-threats/</loc>
		<lastmod>2025-08-02T17:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-comp-ai-lands-2-6m-pre-seed-to-modernize-compliance-disrupt-soc-2-market/</loc>
		<lastmod>2025-08-02T17:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenleck-in-mcdonalds-einstellungsplattform-mchire-legt-uber-64-millionen-bewerbungen-offen/</loc>
		<lastmod>2025-08-02T17:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cl0969-installs-covert-malware-in-telecom-networks-during-10-month-espionage-campaign/</loc>
		<lastmod>2025-08-02T17:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-attack-uses-windows-shortcut-files-to-install-remcos-backdoor/</loc>
		<lastmod>2025-08-02T19:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-mapping-the-saas-attack-surface/</loc>
		<lastmod>2025-08-02T22:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-in-the-promptattacke-auf-llms/</loc>
		<lastmod>2025-08-02T22:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-deckt-secret-blizzard-kampagne-gegen-diplomaten-auf/</loc>
		<lastmod>2025-08-02T22:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-52-millionen-deutsche-konten-im-jahr-2025-bisher-geleakt/</loc>
		<lastmod>2025-08-02T22:36:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hightech-agenda-eco-verband-sieht-richtigen-und-zugleich-uberfalligen-schritt/</loc>
		<lastmod>2025-08-02T23:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-hoch-im-kurs-bei-deutschen-tech-startups/</loc>
		<lastmod>2025-08-02T23:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-presses-nvidia-over-alleged-backdoors-in-h20-chips-amid-tech-tensions/</loc>
		<lastmod>2025-08-02T23:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-backdoor-plague-bypasses-auth-via-malicious-pam-module/</loc>
		<lastmod>2025-08-03T03:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-are-your-non-human-identities/</loc>
		<lastmod>2025-08-03T04:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doch-sicherheitsvorfall-bei-logitech-partnerliste/</loc>
		<lastmod>2025-08-03T06:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/virgin-media-scraps-wholesale-network-rival-to-openreach/</loc>
		<lastmod>2025-08-03T06:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/radioaktive-wespennester-bei-us-atomanlage-gefunden/</loc>
		<lastmod>2025-08-03T07:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-food-sector-cybersecurity-risks-cyber-threats-to-space-infrastructure/</loc>
		<lastmod>2025-08-03T07:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-dark-web-monitoring-tools-in-2025/</loc>
		<lastmod>2025-08-03T07:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-data-engineering-design-patterns-sicher-verschlusseln-in-der-datenpipeline/</loc>
		<lastmod>2025-08-03T09:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-535-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-08-03T10:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iss-is-still-leaking-air-after-latest-repair-efforts-fail/</loc>
		<lastmod>2025-08-03T11:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ninety-laptops-millions-of-dollars-us-woman-jailed-over-north-korea-remote-work-scam/</loc>
		<lastmod>2025-08-03T12:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-ai-deaktivieren-geht-das-uberhaupt/</loc>
		<lastmod>2025-08-03T13:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-one-bites-the-dust-as-kubesphere-kills-open-source-edition/</loc>
		<lastmod>2025-08-03T13:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-hipaa-compliance-software-solutions-providers-in-2025/</loc>
		<lastmod>2025-08-03T13:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legal-aid-cyber-attack-has-pushed-sector-towards-collapse-say-lawyers/</loc>
		<lastmod>2025-08-03T13:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-10-langer-nutzen-so-sicherst-du-dir-ein-jahr-zusatzlichen-support/</loc>
		<lastmod>2025-08-03T13:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-confirms-trumps-national-cyber-director-nominee/</loc>
		<lastmod>2025-08-03T14:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks/</loc>
		<lastmod>2025-08-03T14:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-56/</loc>
		<lastmod>2025-08-03T14:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pi-hole-plugin-flaw-exposes-donor-names-and-email-addresses-in-data-breach/</loc>
		<lastmod>2025-08-03T16:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-confirms-national-cyber-director-pick-sean-cairncross/</loc>
		<lastmod>2025-08-03T17:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-die-website-einer-stadtverwaltung-in-sachsen-anhalt-deutschland/</loc>
		<lastmod>2025-08-03T20:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sozialministerium-in-georgia-usa-von-cyberangriff-auf-einen-dienstleister-betroffen/</loc>
		<lastmod>2025-08-03T20:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-security-measures-capable-enough/</loc>
		<lastmod>2025-08-03T22:36:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/controlling-nhis-strategy-for-modern-security/</loc>
		<lastmod>2025-08-03T22:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stay-proactive-secure-your-cloud-identities/</loc>
		<lastmod>2025-08-03T22:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-service-mesh-security-shifting-focus-to-the-application-layer/</loc>
		<lastmod>2025-08-03T22:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hightech-agenda-bitkom-begrust-abkehr-vom-gieskannenprinzip/</loc>
		<lastmod>2025-08-03T22:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-link-wrapping-services-to-steal-microsoft-365-logins/</loc>
		<lastmod>2025-08-03T22:37:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vertrauen-entscheidender-als-werbung-it-entscheider-konsultieren-bevorzugt-fachpresse/</loc>
		<lastmod>2025-08-03T23:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uberwachungskameras-wenn-sicherheitstechnik-zum-risiko-wird/</loc>
		<lastmod>2025-08-03T23:36:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onedrive-personal-synchronisiert-auch-business-daten-ein-problem/</loc>
		<lastmod>2025-08-03T23:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-telecom-threat-liminal-pandas-covert-campaign-targets-southwest-asian-critical-infrastructure/</loc>
		<lastmod>2025-08-04T03:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-escalates-cyber-espionage-on-india-poseidon-backdoor-targets-railways-oil-government/</loc>
		<lastmod>2025-08-04T03:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysten-warnen-hackern-wird-es-oft-zu-leicht-gemacht/</loc>
		<lastmod>2025-08-04T04:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-keeping-risk-leaders-up-at-night-ai-tariffs-and-cost-cuts/</loc>
		<lastmod>2025-08-04T04:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-password-recovery-utility-hashcat-7-0-0-released/</loc>
		<lastmod>2025-08-04T05:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-surprising-truth-about-identity-security-confidence/</loc>
		<lastmod>2025-08-04T05:37:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-cyberangriff-auf-lookiero-entschadigungen-nach-datenleck-kanzlei-setzt-5-000-euro-durch/</loc>
		<lastmod>2025-08-04T05:37:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhis-continue-to-outpace-human-identities-and-bump-up-security-risk/</loc>
		<lastmod>2025-08-04T06:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-gemeinnutzige-organisation-in-baden-wurttemberg-deutschland/</loc>
		<lastmod>2025-08-04T06:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aiboms-are-the-new-sboms-the-missing-link-in-ai-risk-management/</loc>
		<lastmod>2025-08-04T06:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/average-global-data-breach-cost-now-4-44-million/</loc>
		<lastmod>2025-08-04T06:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-hashicorp-vulnerability-allows-attackers-to-run-code-on-host-machine/</loc>
		<lastmod>2025-08-04T06:37:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-cursor-ide-exposes-users-to-silent-remote-code-execution/</loc>
		<lastmod>2025-08-04T06:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nestjs-vulnerability-allows-code-execution-on-developer-machines/</loc>
		<lastmod>2025-08-04T06:38:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-cost-of-a-data-breach-report-2025-kosten-von-datenlecks-sinken-in-deutschland-erstmals-seit-5-jahren/</loc>
		<lastmod>2025-08-04T06:38:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-things-keeping-cisos-up-at-night/</loc>
		<lastmod>2025-08-04T07:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-era-of-cyberthreats-from-sophisticated-threat-actors-is-here/</loc>
		<lastmod>2025-08-04T07:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-investigated-320-north-korean-it-worker-cases-in-the-past-year/</loc>
		<lastmod>2025-08-04T07:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-botched-great-firewall-upgrade-invites-attacks-on-its-censorship-infrastructure/</loc>
		<lastmod>2025-08-04T07:37:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-squid-flaw-allows-remote-code-execution-by-attackers/</loc>
		<lastmod>2025-08-04T07:37:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orange-baut-cybersecurity-geschaft-weiter-aus-orange-cyberdefense-kauft-ensec-und-starkt-prasenz-im-dach-raum/</loc>
		<lastmod>2025-08-04T07:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerabilities-in-government-linked-partner-software-allow-remote-code-attacks/</loc>
		<lastmod>2025-08-04T08:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/playpraetor-android-trojan-infects-11000-devices-via-fake-google-play-pages-and-meta-ads/</loc>
		<lastmod>2025-08-04T08:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bhusa-cloud-intrusions-skyrocket-in-2025/</loc>
		<lastmod>2025-08-04T08:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-aeroflot-hacker-leaken-daten-von-russlands-groster-airline/</loc>
		<lastmod>2025-08-04T08:36:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-securing-the-backbone-of-agentic-ai/</loc>
		<lastmod>2025-08-04T10:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-h20-und-mehr-gigantischer-ruckstau-in-us-behorde-verhindert-exporte/</loc>
		<lastmod>2025-08-04T10:05:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-age-checks-performed-as-uk-online-safey-act-gets-rolling/</loc>
		<lastmod>2025-08-04T10:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lovense-flaws-expose-emails-and-allow-account-takeover/</loc>
		<lastmod>2025-08-04T10:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-group-cl-sta-0969-targeted-southeast-asian-telecoms-in-2024/</loc>
		<lastmod>2025-08-04T10:05:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pwn2own-offers-1m-for-zero-click-whatsapp-exploit/</loc>
		<lastmod>2025-08-04T10:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacyidea-workshop-teil-5-sichere-anmeldung-an-jedem-windows-desktop-mit-privacyidea/</loc>
		<lastmod>2025-08-04T10:06:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/127-000-bitcoin-gigantischer-kryptodiebstahl-bleibt-jahrelang-unentdeckt/</loc>
		<lastmod>2025-08-04T10:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pi-hole-data-breach-exposes-donor-emails-through-wordpress-plugin-flaw/</loc>
		<lastmod>2025-08-04T10:49:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/capacity-planning-a-rising-concern-for-datacenter-operators-as-ai-grows/</loc>
		<lastmod>2025-08-04T10:50:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/early-bird-registration-now-open-for-the-inaugural-openssl-conference-2025/</loc>
		<lastmod>2025-08-04T10:50:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malwarebytes-vs-norton-2025-which-antivirus-solution-is-better/</loc>
		<lastmod>2025-08-04T10:50:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-hiding-malware-within-jpeg-files-to-attack-windows-systems-bypassing-detections/</loc>
		<lastmod>2025-08-04T10:50:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-uses-clickfix-exploit-to-execute-malicious-commands-on-windows/</loc>
		<lastmod>2025-08-04T10:50:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shared-responsibility-model-daten-in-microsoft-365-sind-automatisch-geschutzt-ein-gefahrlicher-irrtum/</loc>
		<lastmod>2025-08-04T10:51:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-networks-uberzeugt-mit-innovation-und-einfachheit-platin-fur-mikrosegmentierung/</loc>
		<lastmod>2025-08-04T10:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/panel-to-create-roadmap-for-establishing-us-cyber-force/</loc>
		<lastmod>2025-08-04T11:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-phone-repair-biz-collapses-following-2023-ransomware-attack/</loc>
		<lastmod>2025-08-04T11:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-warns-users-to-update-dahua-cameras-over-critical-flaws/</loc>
		<lastmod>2025-08-04T11:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-military-is-raking-in-millions-from-on-base-slot-machines/</loc>
		<lastmod>2025-08-04T11:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-warns-of-phishing-attacks-targeting-add-on-developers/</loc>
		<lastmod>2025-08-04T11:37:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowsyndicate-infrastructure-used-by-multiple-ransomware-groups-including-cl0p-lockbit-and-ransomhub/</loc>
		<lastmod>2025-08-04T11:38:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-wild-west-of-shadow-it/</loc>
		<lastmod>2025-08-04T11:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaked-patched-and-still-hacked-the-sharepoint-zero-day-crisis/</loc>
		<lastmod>2025-08-04T12:38:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-plague-infiltrated-linux-systems-without-leaving-a-trace/</loc>
		<lastmod>2025-08-04T12:38:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacks-the-evolving-extortion-threat-to-us-financial-institutions/</loc>
		<lastmod>2025-08-04T12:38:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-thorium-an-open-source-scalable-platform-for-malware-analysis/</loc>
		<lastmod>2025-08-04T12:39:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaked-patched-and-still-hacked-the-sharepoint-zero-day-crisis-2/</loc>
		<lastmod>2025-08-04T12:39:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sean-cairncross-confirmed-as-national-cyber-director/</loc>
		<lastmod>2025-08-04T12:39:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-plague-infiltrated-linux-systems-without-leaving-a-trace-2/</loc>
		<lastmod>2025-08-04T12:39:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktivitaten-mit-fokus-auf-sonicwall-ssl-vpns-der-ransomware-akira-nehmen-zu/</loc>
		<lastmod>2025-08-04T12:40:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfassende-cybersecurityservices-von-bitdefender/</loc>
		<lastmod>2025-08-04T12:40:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-firewalls-targeted-in-ransomware-attacks-possibly-via-zero-day/</loc>
		<lastmod>2025-08-04T12:40:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-join-attacks-targeting-microsoft-sharepoint-servers/</loc>
		<lastmod>2025-08-04T12:41:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/biggest-ever-bitcoin-hack-uncovered-3-5b-stolen-in-silent-breach/</loc>
		<lastmod>2025-08-04T12:41:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktivitaten-mit-fokus-auf-sonicwall-ssl-vpns-der-ransomware-akira-nehmen-zu-2/</loc>
		<lastmod>2025-08-04T12:41:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-leverage-ai-to-craft-malicious-npm-package-that-drains-crypto-wallets/</loc>
		<lastmod>2025-08-04T12:42:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-use-0-day-to-exploit-google-kernelctf-and-debian-12/</loc>
		<lastmod>2025-08-04T12:42:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-playready-drm-used-by-netflix-amazon-and-disney-allegedly-leaked-online/</loc>
		<lastmod>2025-08-04T12:42:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-vpn-0-day-encryption-backdoor-ai-malware-macos-flaw-atm-hack-more/</loc>
		<lastmod>2025-08-04T12:42:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manthe-middle-attack-prevention-guide/</loc>
		<lastmod>2025-08-04T12:43:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plattform-fur-austausch-und-zertifizierungen-sysdig-startet-open-source-community/</loc>
		<lastmod>2025-08-04T12:43:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/groser-netzausfall-in-luxemburg-behorden-verdachtigen-wohl-huawei-technik/</loc>
		<lastmod>2025-08-04T12:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-cisa-head-easterly-rescinded-west-point-post-victim-of-manufactured-outrage/</loc>
		<lastmod>2025-08-04T13:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/july-recap-new-aws-services-and-privileged-permissions/</loc>
		<lastmod>2025-08-04T13:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-spies-posing-as-remote-workers-have-infiltrated-hundreds-of-companies-says-crowdstrike/</loc>
		<lastmod>2025-08-04T13:37:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akzeptanz-von-genai-plattformen-steigert-auch-die-schatten-ki-risiken/</loc>
		<lastmod>2025-08-04T13:37:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-briefly-turned-off-indian-companys-cloud-perhaps-due-to-eu-sanctions-on-russia/</loc>
		<lastmod>2025-08-04T13:38:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legalpwn-attack-tricks-genai-tools-into-misclassifying-malware-as-safe-code/</loc>
		<lastmod>2025-08-04T13:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-issues-warning-on-phishing-campaign-targeting-add-on-developer-accounts/</loc>
		<lastmod>2025-08-04T13:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fujifilm-printer-flaw-allows-attackers-to-trigger-dos-attacks/</loc>
		<lastmod>2025-08-04T13:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-the-role-of-provable-randomness-in-cybersecurity/</loc>
		<lastmod>2025-08-04T13:38:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uptick-in-akira-ransomware-actors-targeting-sonicwall-vpns/</loc>
		<lastmod>2025-08-04T13:38:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-skies-balancing-cybersecurity-innovation-and-risk-in-modern-aviation/</loc>
		<lastmod>2025-08-04T14:37:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-in-the-ai-era-start-small-protect-what-matters/</loc>
		<lastmod>2025-08-04T14:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-things-to-know-from-crowdstrikes-2025-threat-hunting-report/</loc>
		<lastmod>2025-08-04T14:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/local-government-cybersecurity-why-municipal-systems-need-extra-protection/</loc>
		<lastmod>2025-08-04T14:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/playpraetor-android-rat-expands-rapidly-across-spanish-and-french-speaking-regions/</loc>
		<lastmod>2025-08-04T14:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bhusa-microsoft-and-google-among-most-affected-as-zero-day-exploits-jump-46/</loc>
		<lastmod>2025-08-04T14:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/web-based-ai-usage-surge-shifts-global-internet-traffic-patterns/</loc>
		<lastmod>2025-08-04T14:37:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empfehlungen-und-meldepflichten-bsi-veroffentlicht-nis-2-infopakete/</loc>
		<lastmod>2025-08-04T14:38:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-somethings-phishy-see-the-hook-before-the-bait/</loc>
		<lastmod>2025-08-04T15:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-and-the-future-of-programming-a-paradigm-shift-in-how-we-build-software/</loc>
		<lastmod>2025-08-04T15:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-openssl-conference-to-convene-experts-on-cryptograohy-compliance-and-open-source/</loc>
		<lastmod>2025-08-04T15:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-2025-why-we-built-a-museum-instead-of-a-booth/</loc>
		<lastmod>2025-08-04T15:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sharepoint-zero-day-allows-unauthenticated-remote-code-execution/</loc>
		<lastmod>2025-08-04T15:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-setzen-ki-bei-kritis-angriffen-ein/</loc>
		<lastmod>2025-08-04T15:38:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacked-crimean-servers-reveal-information-about-abducted-children-ukraine-says/</loc>
		<lastmod>2025-08-04T15:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-flags-phishing-wave-aimed-at-hijacking-trusted-firefox-add-ons/</loc>
		<lastmod>2025-08-04T15:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-plague-linux-malware-stealthily-maintains-ssh-access/</loc>
		<lastmod>2025-08-04T15:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-human-vulnerability-into-organizational-strength/</loc>
		<lastmod>2025-08-04T15:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vietnamese-hackers-use-pxa-stealer-hit-4000-ips-and-steal-200000-passwords-globally/</loc>
		<lastmod>2025-08-04T15:40:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonars-take-software-development-under-americas-ai-action-plan/</loc>
		<lastmod>2025-08-04T16:37:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-helping-hackers-automate-and-customize-cyberattacks/</loc>
		<lastmod>2025-08-04T16:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdoors-breaches-how-talos-is-helping-humanitarian-aid-ngos-prepare-for-cyber-attacks/</loc>
		<lastmod>2025-08-04T16:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/perplexity-accused-of-scraping-websites-that-explicitly-blocked-ai-scraping/</loc>
		<lastmod>2025-08-04T16:38:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nextron-findet-bisher-unbekannte-plague-backdoor-in-linux/</loc>
		<lastmod>2025-08-04T16:38:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-jsceal-malware-targets-millions-via-fake-crypto-app-ads/</loc>
		<lastmod>2025-08-04T16:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proliferation-of-on-premise-genai-platforms-is-widening-security-risks/</loc>
		<lastmod>2025-08-04T16:38:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-a-target-rich-zone-for-cyber-attackers-in-2025/</loc>
		<lastmod>2025-08-04T16:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ctm360-spots-malicious-clicktok-campaign-targeting-tiktok-shop-users/</loc>
		<lastmod>2025-08-04T16:38:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-network-security-challenges-persist-despite-desire-to-modernize/</loc>
		<lastmod>2025-08-04T17:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-apps-fur-m365-phishing-missbraucht/</loc>
		<lastmod>2025-08-04T17:38:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-vpn-attacks-five-key-things-to-know/</loc>
		<lastmod>2025-08-04T17:39:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/northwest-radiologists-data-breach-hits-350000-in-washington/</loc>
		<lastmod>2025-08-04T17:39:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-uses-isps-to-spy-on-diplomats-warns-microsoft/</loc>
		<lastmod>2025-08-04T17:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-network-security-challenges-persist-despite-desire-to-modernize-2/</loc>
		<lastmod>2025-08-04T17:39:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-usa-halcyon-and-sophos-tag-team-ransomware-fightback/</loc>
		<lastmod>2025-08-04T17:40:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outdated-office-apps-lose-access-to-voice-features-in-january/</loc>
		<lastmod>2025-08-04T17:40:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ramps-up-assault-on-sonicwall-firewalls-suggesting-zero-day/</loc>
		<lastmod>2025-08-04T17:40:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-triton-bugs-let-unauthenticated-attackers-execute-code-and-hijack-ai-servers/</loc>
		<lastmod>2025-08-04T17:41:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armis-erreicht-uber-300-millionen-us-dollar-arr/</loc>
		<lastmod>2025-08-04T17:41:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jury-sends-a-message-on-app-privacy-in-ruling-against-meta/</loc>
		<lastmod>2025-08-04T18:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/details-emerge-on-blacksuit-ransomware-takedown/</loc>
		<lastmod>2025-08-04T18:37:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-group-d4rk4rmy-claimed-the-hack-of-monte-carlo-sociata-des-bains-de-mer/</loc>
		<lastmod>2025-08-04T18:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/milan-court-rejects-chinese-hackers-house-arrest-plea/</loc>
		<lastmod>2025-08-04T18:38:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-and-aiops-boosting-resilience-with-nist-ra-05/</loc>
		<lastmod>2025-08-04T19:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-enables-new-edge-integration-to-accelerate-onboarding-timevalue/</loc>
		<lastmod>2025-08-04T19:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appomni-launches-new-saas-and-ai-security-packages-to-tackle-rising-risks/</loc>
		<lastmod>2025-08-04T19:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-investigating-if-zero-day-flaw-is-behind-recent-attacks/</loc>
		<lastmod>2025-08-04T19:37:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/highly-evasive-vietnamese-speaking-hackers-stealing-data-from-thousands-of-victims-in-62-nations/</loc>
		<lastmod>2025-08-04T19:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/python-powered-malware-snags-hundreds-of-credit-cards-200k-passwords-and-4m-cookies/</loc>
		<lastmod>2025-08-04T19:38:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-used-china-based-engineers-to-maintain-vulnerable-sharepoint/</loc>
		<lastmod>2025-08-04T19:38:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-fixes-authenticator-bug-leaking-totp-secrets-in-logs/</loc>
		<lastmod>2025-08-04T19:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-attack-uses-lnk-files-to-deploy-remcos-backdoor-on-windows-systems/</loc>
		<lastmod>2025-08-04T19:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surge-in-threat-actor-exploitation-attempts-serves-as-early-warning-of-emerging-cyber-vulnerabilities/</loc>
		<lastmod>2025-08-04T19:38:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-software-bill-of-materials-sbom-4-critical-benefits/</loc>
		<lastmod>2025-08-04T20:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dod-ready-software-embracing-the-swft-initiative-with-confidence/</loc>
		<lastmod>2025-08-04T20:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-site-perplexity-uses-stealth-tactics-to-flout-no-crawl-edicts-cloudflare-says/</loc>
		<lastmod>2025-08-04T20:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-urges-customers-to-take-vpn-devices-offline-after-ransomware-campaign/</loc>
		<lastmod>2025-08-04T20:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-its-ai-based-bug-hunter-found-20-security-vulnerabilities/</loc>
		<lastmod>2025-08-04T20:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-microsoft-365-direct-send-to-deliver-internal-phishing-emails/</loc>
		<lastmod>2025-08-04T20:38:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delta-air-lines-taps-ai-to-rewrite-rules-of-ticket-pricing/</loc>
		<lastmod>2025-08-04T20:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-talos-researcher-reveals-method-that-causes-llms-to-reveal-training-data/</loc>
		<lastmod>2025-08-04T20:38:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cncert-accuses-u-s-intelligence-of-cyberattacks-on-chinese-military-industrial-targets/</loc>
		<lastmod>2025-08-04T20:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modular-malware-suite-sold-by-threat-actors-through-public-storefront-domains/</loc>
		<lastmod>2025-08-04T20:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-increasingly-leaning-on-genai-tools/</loc>
		<lastmod>2025-08-04T20:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scaling-security-with-nhis-in-mind/</loc>
		<lastmod>2025-08-04T21:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-trust-through-robust-secrets-management/</loc>
		<lastmod>2025-08-04T21:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ensuring-stability-in-your-cybersecurity-approach/</loc>
		<lastmod>2025-08-04T21:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-ticketing-systems-are-streamlining-it-support-in-the-age-of-content-streaming/</loc>
		<lastmod>2025-08-04T21:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-fraud-funnels-how-social-media-scams-are-fueling-targeted-email-attacks/</loc>
		<lastmod>2025-08-04T21:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-atms-fueling-criminal-activity-treasury-warns/</loc>
		<lastmod>2025-08-04T21:38:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-company-perplexity-is-sneaking-to-get-around-blocks-on-crawlers-cloudflare-alleges/</loc>
		<lastmod>2025-08-04T21:38:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-confirms-trumps-national-cyber-director-nominee-2/</loc>
		<lastmod>2025-08-04T21:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-rise-of-ai-exploits-and-the-cost-of-shadow-ai/</loc>
		<lastmod>2025-08-04T21:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/</loc>
		<lastmod>2025-08-04T21:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-ai-to-scale-attacks-and-target-autonomous-agents/</loc>
		<lastmod>2025-08-04T21:39:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pxa-stealer-distributed-via-telegram-harvests-200k-passwords-and-credit-card-data/</loc>
		<lastmod>2025-08-04T21:39:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-patches-critical-rce-vulnerability-chain/</loc>
		<lastmod>2025-08-04T21:39:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-fema-announce-100m-in-community-cybersecurity-grants/</loc>
		<lastmod>2025-08-04T21:39:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-llm-risk-5-improper-output-handling-firetail-blog/</loc>
		<lastmod>2025-08-04T22:37:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elevate-your-influence-building-a-personal-brand-in-tech-2025/</loc>
		<lastmod>2025-08-04T22:37:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-tracking-the-worlds-dumbest-cyber-mercenaries/</loc>
		<lastmod>2025-08-04T22:38:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-inaturalist-animals-and-plants/</loc>
		<lastmod>2025-08-04T22:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-addresses-six-vulnerabilities-in-augusts-android-security-update/</loc>
		<lastmod>2025-08-04T22:38:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silicon-saxony-hightech-agenda-der-bundesregierung-mikroelektronik-turbo-mit-milliardenpotenzial/</loc>
		<lastmod>2025-08-04T22:38:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-investigates-cyber-incidents-including-ransomware-targeting-suspected-0-day/</loc>
		<lastmod>2025-08-04T22:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risks-and-rewards-for-scaling-up-the-uk-cybersecurity-market/</loc>
		<lastmod>2025-08-04T22:38:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/do-we-really-need-it-ot-integration/</loc>
		<lastmod>2025-08-04T22:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jury-holds-meta-accountable-in-landmark-privacy-decision/</loc>
		<lastmod>2025-08-04T22:38:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-hits-phone-repair-insurance-firm-causing-millions-in-damage/</loc>
		<lastmod>2025-08-04T22:40:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wirtschaftskriminalitat-bka-meldet-steigende-fallzahlen-und-hohe-finanzielle-schaden/</loc>
		<lastmod>2025-08-04T23:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zunahme-der-physischen-bedrohung-fur-kritis-hensec-rat-zur-flexiblen-zivilen-luftraumuberwachung/</loc>
		<lastmod>2025-08-04T23:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-nation-state-hackers-breach-southeast-asian-telecoms/</loc>
		<lastmod>2025-08-04T23:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-failed-strategy-security-as-an-afterthought/</loc>
		<lastmod>2025-08-05T03:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-eliminate-deployment-bottlenecks-without-sacrificing-application-security/</loc>
		<lastmod>2025-08-05T03:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keyfactor-hires-trend-micro-veteran-louise-mcevoy-as-channel-chief/</loc>
		<lastmod>2025-08-05T03:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/antivirus-vendors-fail-to-spot-persistent-nasty-stealthy-linux-backdoor/</loc>
		<lastmod>2025-08-05T03:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-trends-automating-security-questionnaires-with-open-apis/</loc>
		<lastmod>2025-08-05T04:38:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indias-markets-regulator-wants-to-ease-rules-on-related-party-deals-heres-what-that-means/</loc>
		<lastmod>2025-08-05T04:38:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-risk-assessment-template-a-step-by-step-guide-to-effective-risk-management/</loc>
		<lastmod>2025-08-05T04:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wahlbezogene-deepfakes-erreichten-38-milliarden-menschen-x-als-hauptkanal/</loc>
		<lastmod>2025-08-05T04:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-verandert-ki-ihre-grc-strategie/</loc>
		<lastmod>2025-08-05T04:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-einen-it-dienstleister-in-sachsen-anhalt-deutschland/</loc>
		<lastmod>2025-08-05T04:39:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-stadtverwaltung-in-oklahoma-usa/</loc>
		<lastmod>2025-08-05T04:39:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-the-new-perimeter-for-cloud-security-companies-using-cnapp/</loc>
		<lastmod>2025-08-05T04:39:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-employees-uploaded-over-a-gig-of-files-to-genai-tools-last-quarter/</loc>
		<lastmod>2025-08-05T05:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/back-to-basics-webinar-the-ecosystem-of-cis-security-best-practices/</loc>
		<lastmod>2025-08-05T05:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-groups-shift-to-quadruple-extortion-to-maximize-pressure/</loc>
		<lastmod>2025-08-05T05:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-ai-flaws-let-attackers-execute-unauthorized-commands-using-the-model-itself/</loc>
		<lastmod>2025-08-05T05:37:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-cyberangriff-hacker-falschen-rechnungen-und-kassieren-100-000-euro/</loc>
		<lastmod>2025-08-05T05:38:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hausdurchsuchung-nach-gucci-deal-wenn-der-kauf-im-luxus-fake-shop-strafbar-wird/</loc>
		<lastmod>2025-08-05T06:36:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloodhound-8-0-debuts-with-major-upgrades-in-attack-path-management/</loc>
		<lastmod>2025-08-05T06:37:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legalpwn-attack-tricks-ai-tools-like-chatgpt-and-gemini-into-running-malicious-code/</loc>
		<lastmod>2025-08-05T06:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-cyberkriminelle-mit-fake-jobangeboten-und-rmm-tools-zuschlagen-cyberangriffe-auf-bewerber-nehmen-zu/</loc>
		<lastmod>2025-08-05T06:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cybersecurity-ma-deals-for-2025/</loc>
		<lastmod>2025-08-05T07:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brave-browser-tipps-den-chrome-basierten-browser-optimal-nutzen/</loc>
		<lastmod>2025-08-05T07:37:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-tooling-pitfalls-for-small-teams-cost-complexity-and-low-roi/</loc>
		<lastmod>2025-08-05T07:37:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/waf-protections-bypassed-via-js-injection-and-parameter-pollution-for-xss-attacks/</loc>
		<lastmod>2025-08-05T07:38:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-investigating-potential-ssl-vpn-zero-day-after-20-targeted-attacks-reported/</loc>
		<lastmod>2025-08-05T07:38:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkung-der-sicherheitsstandards-fur-cloud-dienste-ftapi-erhalt-c5-typ-2-zertifizierung/</loc>
		<lastmod>2025-08-05T07:40:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-auf-leisen-sohlen-wie-angreifer-unbemerkt-ins-system-schleichen/</loc>
		<lastmod>2025-08-05T07:40:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-hard-truths-of-a-career-in-cybersecurity-and-how-to-navigate-them/</loc>
		<lastmod>2025-08-05T08:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-goes-cloud-native-to-target-your-backup-infrastructure/</loc>
		<lastmod>2025-08-05T08:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/streamlit-vulnerability-exposes-users-to-cloud-account-takeover-attacks/</loc>
		<lastmod>2025-08-05T08:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15000-fake-tiktok-shop-domains-deliver-malware-steal-crypto-via-ai-driven-scam-campaign/</loc>
		<lastmod>2025-08-05T08:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-in-the-zip-reveals-expanding-ecosystem-behind-pxa-stealer/</loc>
		<lastmod>2025-08-05T08:37:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chaining-nvidias-triton-server-flaws-exposes-ai-systems-to-remote-takeover/</loc>
		<lastmod>2025-08-05T09:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-accuses-ai-startup-of-stealth-crawling-behavior-across-millions-of-sites/</loc>
		<lastmod>2025-08-05T09:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chollima-apt-group-targets-job-seekers-and-organizations-with-javascript-based-malware/</loc>
		<lastmod>2025-08-05T09:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-fuels-record-number-of-fraud-cases/</loc>
		<lastmod>2025-08-05T09:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/video-tipp-72-azure-update-manager-sichere-und-automatisierte-updates-mit-azure-update-manager/</loc>
		<lastmod>2025-08-05T09:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nehmen-deutschland-zunehmend-ins-visier/</loc>
		<lastmod>2025-08-05T09:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-insights-zum-sharepoint-gate-mitarbeiter-aus-china-fur-die-wartung/</loc>
		<lastmod>2025-08-05T10:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-investigates-possible-zero-day-amid-akira-ransomware-surge/</loc>
		<lastmod>2025-08-05T10:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-increases-zero-day-quest-prize-pool-to-5-million/</loc>
		<lastmod>2025-08-05T10:37:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raspberry-robin-malware-targets-windows-systems-via-new-clfs-driver-exploit/</loc>
		<lastmod>2025-08-05T10:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-android-malware-poses-as-sbi-card-and-axis-bank-apps-to-steal-financial-data/</loc>
		<lastmod>2025-08-05T10:38:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-top-cisos-save-their-socs-from-alert-chaos-to-never-miss-real-incidents/</loc>
		<lastmod>2025-08-05T10:39:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategien-fur-komplexe-cloud-umgebungen-cybersecurity-im-multicloud-zeitalter/</loc>
		<lastmod>2025-08-05T10:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualys-stellt-seinen-neuen-cyber-risk-ai-agents-vor/</loc>
		<lastmod>2025-08-05T10:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forscher-warnen-bisher-unbekannte-linux-backdoor-ist-seit-monaten-aktiv/</loc>
		<lastmod>2025-08-05T10:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-top-cisos-save-their-socs-from-alert-chaos-to-never-miss-real-incidents-2/</loc>
		<lastmod>2025-08-05T10:39:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-dynamic-application-security-testing-dast-help-your-organization/</loc>
		<lastmod>2025-08-05T11:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionageskandal-bei-tsmc-ex-angestellte-sollen-2-nm-technologie-verausert-haben/</loc>
		<lastmod>2025-08-05T11:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firebox-tabletop-appliances-fur-kmus-kombinieren-intelligente-firewall-sicherheit-mit-ki-gestutzter-bedrohungserkennung/</loc>
		<lastmod>2025-08-05T11:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blockt-microsoft-defender-bei-euch-borncity-com-in-outlook/</loc>
		<lastmod>2025-08-05T11:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-summer-camp-what-to-expect-from-bsides-black-hat-and-def-con/</loc>
		<lastmod>2025-08-05T11:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-gets-patches-for-qualcomm-flaws-exploited-in-attacks/</loc>
		<lastmod>2025-08-05T11:38:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mediatek-chip-vulnerabilities-allow-attackers-to-gain-elevated-access/</loc>
		<lastmod>2025-08-05T11:38:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-adodb-sqlite3-driver-allows-arbitrary-sql-execution/</loc>
		<lastmod>2025-08-05T11:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-iran-hackers-aligned-cyber-with-kinetic-war-aims/</loc>
		<lastmod>2025-08-05T11:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mogliche-zero-day-lucke-sonicwall-warnt-vor-massenhaften-angriffen-auf-firewalls/</loc>
		<lastmod>2025-08-05T11:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forscher-warnen-bisher-unbekannte-linux-malware-ist-seit-monaten-aktiv/</loc>
		<lastmod>2025-08-05T11:39:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-areas-cisos-must-assess-before-being-ai-ready/</loc>
		<lastmod>2025-08-05T12:37:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-under-pressure/</loc>
		<lastmod>2025-08-05T12:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tsmc-mitarbeiter-unter-spionageverdacht-festgenommen/</loc>
		<lastmod>2025-08-05T12:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-age-of-infostealers-is-here-is-your-financial-service-secure/</loc>
		<lastmod>2025-08-05T12:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-to-acquire-ai-protection-startup-prompt-security/</loc>
		<lastmod>2025-08-05T12:38:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-und-halcyon-bundeln-ihre-cybersecurity-krafte/</loc>
		<lastmod>2025-08-05T12:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agenticgestutztes-risk-operations-center-fur-autonomes-risk-management/</loc>
		<lastmod>2025-08-05T12:38:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-cdn-link-abused-to-deliver-rat-disguised-as-onedrive-file/</loc>
		<lastmod>2025-08-05T12:39:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exposed-without-a-breach-the-cost-of-data-blindness/</loc>
		<lastmod>2025-08-05T12:39:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-urges-admins-to-disable-sslvpn-amid-rising-attacks/</loc>
		<lastmod>2025-08-05T12:39:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-und-halcyon-bundeln-ihre-cybersecurity-krafte-2/</loc>
		<lastmod>2025-08-05T12:39:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-exploit-npm-packages-to-steal-cryptocurrency-and-sensitive-data/</loc>
		<lastmod>2025-08-05T12:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-open-source-vulnerabilities-to-spread-malicious-code/</loc>
		<lastmod>2025-08-05T12:41:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-under-attack-how-organizations-can-counter-rising-threats/</loc>
		<lastmod>2025-08-05T12:41:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/misconfigurations-are-not-vulnerabilities-the-costly-confusion-behind-security-risks/</loc>
		<lastmod>2025-08-05T12:41:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-cites-falsified-records-in-two-recent-settlements-with-chief-compliance-officers/</loc>
		<lastmod>2025-08-05T13:38:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-day-in-the-life-of-a-soc-operations-manager-prioritizing-high-risk-incidents-to-improve-soc-efficiency/</loc>
		<lastmod>2025-08-05T13:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-patches-critical-triton-server-bugs-that-threaten-ai-model-security/</loc>
		<lastmod>2025-08-05T13:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-caribbean-islands-respond-to-cyberattacks-on-courts-tax-departments/</loc>
		<lastmod>2025-08-05T13:39:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revault-when-your-soc-turns-against-you%c2%a6/</loc>
		<lastmod>2025-08-05T13:39:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-telekommunikationsanbieter-ihre-cyberrisiken-reduzieren/</loc>
		<lastmod>2025-08-05T13:39:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-kennen-keine-ferienzeiten/</loc>
		<lastmod>2025-08-05T13:39:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-firing-spree-shrinking-job-market-looks-even-worse-after-bls-revisions/</loc>
		<lastmod>2025-08-05T13:39:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-google-authenticator-alternatives/</loc>
		<lastmod>2025-08-05T13:40:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-talos-researcher-reveals-method-that-causes-llms-to-expose-training-data/</loc>
		<lastmod>2025-08-05T13:40:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-alerts-on-surge-of-attacks-against-gen-7-firewalls-over-past-72-hours/</loc>
		<lastmod>2025-08-05T13:40:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-targets-indian-government-credential-theft-campaign-uncovered/</loc>
		<lastmod>2025-08-05T13:41:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minimal-hardened-and-updated-daily-the-new-standard-for-secure-containers/</loc>
		<lastmod>2025-08-05T13:41:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-discloses-data-breach-impacting-cisco-com-user-accounts/</loc>
		<lastmod>2025-08-05T13:41:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-teams-hit-by-lowest-budget-growth-in-five-years/</loc>
		<lastmod>2025-08-05T13:41:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-alerts-on-surge-of-attacks-against-gen-7-firewalls-over-past-72-hours-2/</loc>
		<lastmod>2025-08-05T13:41:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-service-data-analytics-erfolgreich-implementieren/</loc>
		<lastmod>2025-08-05T13:43:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-us-energy-companies-frequently-exposed-to-critical-security-flaws/</loc>
		<lastmod>2025-08-06T16:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-relationship-with-industry-needs-work-to-reestablish-trust-experts-say/</loc>
		<lastmod>2025-08-06T16:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uac-0099-hackers-weaponize-hta-files-to-deploy-matchboil-loader-malware/</loc>
		<lastmod>2025-08-06T16:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-genai-to-launch-phishing-attacks-mimicking-government-websites/</loc>
		<lastmod>2025-08-06T16:20:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-authorities-extradite-nigerian-man-accused-of-hacking-and-fraud/</loc>
		<lastmod>2025-08-06T16:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-tollbit-partner-to-protect-and-monetize-ai-traffic/</loc>
		<lastmod>2025-08-06T17:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/https-www-youtube-nocookie-com-embed-ipusfv_iei8sikr-ickosvnp0azou/</loc>
		<lastmod>2025-08-06T17:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/love-your-kubernetes-add-ons-securing-kubernetes-beyond-the-core/</loc>
		<lastmod>2025-08-06T17:20:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-iam-platforms-for-secure-access-mojoauth/</loc>
		<lastmod>2025-08-06T17:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-tutoring-platforms-protect-student-and-parent-logins-with-secure-authentication/</loc>
		<lastmod>2025-08-06T17:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-security-vendors-making-big-moves-at-black-hat-2025/</loc>
		<lastmod>2025-08-06T17:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-things-to-know-on-salesforce-data-theft-attacks/</loc>
		<lastmod>2025-08-06T17:21:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-plunges-insurance-company-into-bankruptcy/</loc>
		<lastmod>2025-08-06T17:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-cracks-down-on-6-8m-scam-accounts-in-global-takedown/</loc>
		<lastmod>2025-08-06T17:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-fixes-two-actively-exploited-apex-one-rce-flaws/</loc>
		<lastmod>2025-08-06T17:21:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-updates-cni-cyber-assessment-framework/</loc>
		<lastmod>2025-08-06T17:22:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/</loc>
		<lastmod>2025-08-06T17:22:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-extradited-to-us-for-stealing-3-3-million-from-taxpayers/</loc>
		<lastmod>2025-08-06T17:22:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-critical-trend-micro-apex-one-zero-day-flaw/</loc>
		<lastmod>2025-08-06T17:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clinical-data-stolen-in-cyber-attack-on-kidney-dialysis-provider-davita/</loc>
		<lastmod>2025-08-06T17:22:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ssrf-to-aws-metadata-exposure-how-attackers-steal-cloud-credentials/</loc>
		<lastmod>2025-08-06T18:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-accesses-millions-of-imdatacenter-records-from-exposed-aws-bucket/</loc>
		<lastmod>2025-08-06T18:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-bets-on-open-models-with-gpt-oss-launch/</loc>
		<lastmod>2025-08-06T18:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-promise-and-pitfalls-of-ephemeral-identities/</loc>
		<lastmod>2025-08-06T19:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-use-cases-for-private-certificate-authorities-in-public-sector-organizations/</loc>
		<lastmod>2025-08-06T19:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mistaken-identity-ai-agent-oversight-key-to-success/</loc>
		<lastmod>2025-08-06T19:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-the-group-behind-last-years-snowflake-attack-slurped-data-from-one-of-its-salesforce-instances/</loc>
		<lastmod>2025-08-06T19:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-agrees-to-pause-ai-workloads-to-protect-the-grid-when-power-demand-spikes/</loc>
		<lastmod>2025-08-06T19:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-year-old-d-link-bugs-see-active-exploitation/</loc>
		<lastmod>2025-08-06T19:21:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/click-here-to-serve-how-volunteering-builds-cyber-careers/</loc>
		<lastmod>2025-08-06T19:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-criminals-would-prefer-businesses-dont-use-okta/</loc>
		<lastmod>2025-08-06T19:21:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-house-id-verification-to-start-in-november-2025/</loc>
		<lastmod>2025-08-06T19:22:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-takes-firm-stance-against-kill-switches-backdoors-in-ai-chips/</loc>
		<lastmod>2025-08-06T19:22:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-1-anthropic-delivers-better-coding-debugging-analytics-abilities/</loc>
		<lastmod>2025-08-06T19:22:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-duck-announces-enhancements-to-ai-powered-application-security-assistant/</loc>
		<lastmod>2025-08-06T19:22:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jen-easterly-joins-huntress-strategic-advisory-board/</loc>
		<lastmod>2025-08-06T19:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-still-prioritizing-zero-trust-migration-to-limit-hacks-damage/</loc>
		<lastmod>2025-08-06T20:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strong-regulation-can-nudge-automakers-to-improve-customers-privacy-research-suggests/</loc>
		<lastmod>2025-08-06T20:19:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tornado-cash-cofounder-dodges-money-laundering-conviction-found-guilty-of-lesser-charge/</loc>
		<lastmod>2025-08-06T20:19:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-national-cyber-director-cairncross-faces-challenges-on-policy-bureaucracy-threats/</loc>
		<lastmod>2025-08-06T20:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-rival-tea-app-for-men-is-leaking-its-users-personal-data-and-drivers-licenses/</loc>
		<lastmod>2025-08-06T20:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-2025-security-researcher-unpacks-cybercrimes-evolution%c2%a6-and-how-ai-is-changing-the-game/</loc>
		<lastmod>2025-08-06T20:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-smart-contracts-to-drain-over-900k-from-crypto-wallets/</loc>
		<lastmod>2025-08-06T20:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mustang-panda-targets-windows-users-with-toneshell-malware-disguised-as-google-chrome/</loc>
		<lastmod>2025-08-06T20:21:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-ai-bot-hijacks-smart-homes-turns-off-the-lights/</loc>
		<lastmod>2025-08-06T20:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contrast-security-adds-github-copilot-and-sumo-logic-integrations-to-adr-platform/</loc>
		<lastmod>2025-08-06T21:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-54987-cve-2025-54948-trend-micro-apex-one-command-injection-zero-days-exploited-in-the-wild/</loc>
		<lastmod>2025-08-06T21:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/act-now-100m-in-fy25-cyber-grants-for-sltts-available-before-august-15/</loc>
		<lastmod>2025-08-06T21:20:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-security-dilemma-navigating-the-high-stakes-world-of-cloud-ai/</loc>
		<lastmod>2025-08-06T21:20:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-protocol-bug-let-attackers-execute-code-in-cursor/</loc>
		<lastmod>2025-08-06T21:21:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contrast-security-adds-github-copilot-and-sumo-logic-integrations-to-adr-platform-2/</loc>
		<lastmod>2025-08-06T21:21:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-year-old-d-link-bugs-under-active-exploitation/</loc>
		<lastmod>2025-08-06T21:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/on-the-rise-ransomware-victims-breaches-infostealers/</loc>
		<lastmod>2025-08-06T21:22:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-abuses-cpu-tuning-tool-to-disable-microsoft-defender/</loc>
		<lastmod>2025-08-06T21:22:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-hackers-use-fake-camera-microphone-alerts-to-deploy-pylangghost-rat/</loc>
		<lastmod>2025-08-06T21:22:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-and-lynx-ransomware-target-msps-using-stolen-credentials-and-exploited-vulnerabilities/</loc>
		<lastmod>2025-08-06T21:23:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vextrio-cybercrime-outfit-run-by-legit-ad-tech-firms/</loc>
		<lastmod>2025-08-06T21:23:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-vpn-and-spam-blocker-apps-tied-to-vextrio-used-in-ad-fraud-subscription-scams/</loc>
		<lastmod>2025-08-06T21:23:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bhusa-researchers-expose-infrastructure-behind-cybercrime-network-vextrio/</loc>
		<lastmod>2025-08-06T21:24:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-previews-aspm-module-for-cortex-cloud-platform/</loc>
		<lastmod>2025-08-06T22:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-identity-federation-means-for-workloads-in-cloud-native-environments/</loc>
		<lastmod>2025-08-06T22:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/full-stack-development-in-the-age-of-llms-what-ctos-and-product-leaders-must-know/</loc>
		<lastmod>2025-08-06T22:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revault-flaws-let-attackers-bypass-windows-login-or-place-malware-implants-on-dell-laptops/</loc>
		<lastmod>2025-08-06T22:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-previews-aspm-module-for-cortex-cloud-platform-2/</loc>
		<lastmod>2025-08-06T22:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-researchers-bullish-on-ai-security-agent-even-though-it-let-74-of-malware-slip-through/</loc>
		<lastmod>2025-08-06T22:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-groups-stole-115-million-us-cards-in-16-month-smishing-campaign/</loc>
		<lastmod>2025-08-06T22:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revault-security-flaws-impact-millions-of-dell-laptops/</loc>
		<lastmod>2025-08-06T22:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bhusa-security-researchers-uncover-critical-flaws-in-axis-cctv-software/</loc>
		<lastmod>2025-08-06T22:22:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/candiru-spyware-infrastructure-uncovered/</loc>
		<lastmod>2025-08-06T23:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dialysis-firm-attack-affects-1-million-costs-13-5m-to-date/</loc>
		<lastmod>2025-08-06T23:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-mr-altman-passwords-are-not-back-in-vogue/</loc>
		<lastmod>2025-08-06T23:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-ire-microsoft-tests-ai-that-autonomously-detects-malware/</loc>
		<lastmod>2025-08-06T23:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zero-day-bugs-crack-open-cyberark-hashicorp-password-vaults/</loc>
		<lastmod>2025-08-06T23:20:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-ecscape-flaw-in-amazon-ecs-enabling-cross-task-credential-theft/</loc>
		<lastmod>2025-08-06T23:21:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secrets-management-fireside-chat-doppler-financial-times-bodi-and-secureframe/</loc>
		<lastmod>2025-08-07T03:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-red-hook-chinese-gift-card-fraud-at-scale/</loc>
		<lastmod>2025-08-07T03:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-third-party-risk-management-soc-2s-security-questionnaires-and-psychosis/</loc>
		<lastmod>2025-08-07T03:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-flettner-rotor/</loc>
		<lastmod>2025-08-07T03:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-microsoft-warn-about-new-microsoft-exchange-server-vulnerability/</loc>
		<lastmod>2025-08-07T03:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-rce-attack-chains-in-popular-enterprise-credential-vaults/</loc>
		<lastmod>2025-08-07T03:20:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-stock-plunges-as-wall-street-questions-firewall-refresh-momentum/</loc>
		<lastmod>2025-08-07T03:21:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-promises-to-eventually-make-winui-truly-open-source/</loc>
		<lastmod>2025-08-07T03:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-usa-startup-breaks-secrets-management-tools/</loc>
		<lastmod>2025-08-07T03:21:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-single-poisoned-document-could-leak-secret-data-via-chatgpt/</loc>
		<lastmod>2025-08-07T03:21:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-attacks-surge-in-2025-becoming-top-cybersecurity-threat/</loc>
		<lastmod>2025-08-07T03:22:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prevent-helpdesk-social-engineering-attacks/</loc>
		<lastmod>2025-08-07T04:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/executives-anonymous-whats-a-siem-and-why-you-should-care/</loc>
		<lastmod>2025-08-07T04:20:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prevent-helpdesk-social-engineering-attacks-2/</loc>
		<lastmod>2025-08-07T04:20:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-wichtige-rolle-der-saas-datensicherung-nach-angriffen-von-salt-typhoon/</loc>
		<lastmod>2025-08-07T04:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/executives-anonymous-whats-a-siem-and-why-you-should-care-2/</loc>
		<lastmod>2025-08-07T04:20:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-regulierung-als-herausforderung-fur-ikt-dienstleister-in-der-finanzbranche/</loc>
		<lastmod>2025-08-07T04:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigerian-accused-of-hacking-tax-preparation-businesses-extradited-to-us/</loc>
		<lastmod>2025-08-07T04:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reassured-security-is-your-data-truly-protected/</loc>
		<lastmod>2025-08-07T05:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-confidence-in-your-secrets-vaults/</loc>
		<lastmod>2025-08-07T05:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/innovation-in-nhis-and-secrets-management/</loc>
		<lastmod>2025-08-07T05:20:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/durch-datenlecks-verursachte-kosten-sind-gefallen/</loc>
		<lastmod>2025-08-07T05:21:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-confidence-in-your-secrets-vaults-2/</loc>
		<lastmod>2025-08-07T05:21:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/innovation-in-nhis-and-secrets-management-2/</loc>
		<lastmod>2025-08-07T05:21:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/durch-datenlecks-verursachte-kosten-sind-gefallen-2/</loc>
		<lastmod>2025-08-07T05:21:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/itjobs-5-bittere-wahrheiten/</loc>
		<lastmod>2025-08-07T05:22:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/itjobs-5-bittere-wahrheiten-2/</loc>
		<lastmod>2025-08-07T05:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-can-write-your-code-but-nearly-half-of-it-may-be-insecure/</loc>
		<lastmod>2025-08-07T05:22:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-confidence-in-your-secrets-vaults-3/</loc>
		<lastmod>2025-08-07T05:22:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/energy-companies-are-blind-to-thousands-of-exposed-services/</loc>
		<lastmod>2025-08-07T05:23:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-salesforce-environment-compromised-user-information-exfiltrated/</loc>
		<lastmod>2025-08-07T05:23:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-spyclouds-ai-powered-platform-mimics-veteran-analysts-speeds-threat-detection/</loc>
		<lastmod>2025-08-07T06:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-fireside-chat-inside-the-mind-of-a-hacker-a10s-plan-for-unified-threat-detection/</loc>
		<lastmod>2025-08-07T06:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noname05716-legt-sachsen-anhalt-lahm/</loc>
		<lastmod>2025-08-07T06:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beef-up-ai-security-with-zero-trust-principles/</loc>
		<lastmod>2025-08-07T06:21:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-spyclouds-ai-powered-platform-mimics-veteran-analysts-speeds-threat-detection-2/</loc>
		<lastmod>2025-08-07T06:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-pqc-building-adaptive-security-programs-for-the-unknown/</loc>
		<lastmod>2025-08-07T06:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-are-getting-personal-and-its-working/</loc>
		<lastmod>2025-08-07T06:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-social-engineering-to-gain-remote-access-in-just-5-minutes/</loc>
		<lastmod>2025-08-07T06:23:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-microsoft-exchange-server-vulnerability-allows-unauthorized-admin-privilege-escalation/</loc>
		<lastmod>2025-08-07T06:23:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-are-getting-personal-and-its-working-2/</loc>
		<lastmod>2025-08-07T06:24:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uber-30-sicherheitslucken-in-ios-18-6-und-ipados-18-6-geschlossen-apple-ios-18-6-schliest-kritische-schwachstellen/</loc>
		<lastmod>2025-08-07T06:24:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/has-cyber-been-infected-with-the-economic-malaise/</loc>
		<lastmod>2025-08-07T07:19:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-bei-google-shinyhunters-hat-zugeschlagen/</loc>
		<lastmod>2025-08-07T07:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbefugter-zugriff-bei-einer-kunstausstellung-in-italien/</loc>
		<lastmod>2025-08-07T07:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnung-vor-angriffen-auf-sonicwall-firewalls-ssl-vpns/</loc>
		<lastmod>2025-08-07T07:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-removes-6-8-million-accounts-over-malicious-activity-concerns/</loc>
		<lastmod>2025-08-07T07:20:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/buzzword-dschungel-mdr-oder-soc-was-brauchen-unternehmen-wirklich/</loc>
		<lastmod>2025-08-07T07:21:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-in-gefahr-warum-europa-bei-it-sicherheit-unabhangiger-werden-muss/</loc>
		<lastmod>2025-08-07T07:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/burger-unter-generalverdacht-dav-kritisiert-uberbordende-befugnisse/</loc>
		<lastmod>2025-08-07T07:25:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mittelstand-kritis-prinzipien-als-inspiration-fur-strukturierte-it-sicherheit/</loc>
		<lastmod>2025-08-07T07:25:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbefugter-zugriff-bei-der-us-justizverwaltung/</loc>
		<lastmod>2025-08-07T07:25:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-accidentally-confirms-gpt-5-gpt-5-mini-gpt-5-nano-ahead-of-launch/</loc>
		<lastmod>2025-08-07T07:25:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everything-you-need-to-know-about-the-california-consumer-privacy-act-ccpa-in-2025/</loc>
		<lastmod>2025-08-07T08:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-remote-code-execution-vulnerability-cve-2025-54135/</loc>
		<lastmod>2025-08-07T08:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-ways-hackers-hide-their-tracks/</loc>
		<lastmod>2025-08-07T08:20:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-tips-for-reducing-the-ransomware-threat/</loc>
		<lastmod>2025-08-07T08:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-pull-plug-on-shared-ews-access-in-hybrid-exchange-by-october/</loc>
		<lastmod>2025-08-07T08:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everything-you-need-to-know-about-the-california-consumer-privacy-act-ccpa-in-2025-2/</loc>
		<lastmod>2025-08-07T08:21:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-remote-code-execution-vulnerability-cve-2025-54135-2/</loc>
		<lastmod>2025-08-07T08:21:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-100-dell-models-exposed-to-critical-controlvault3-firmware-bugs/</loc>
		<lastmod>2025-08-07T08:22:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ctem-boosts-visibility-and-shrinks-attack-surfaces-in-hybrid-and-cloud-environments/</loc>
		<lastmod>2025-08-07T08:22:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/photos-black-hat-usa-2025/</loc>
		<lastmod>2025-08-07T08:23:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-high-severity-flaw-in-hybrid-exchange-deployments/</loc>
		<lastmod>2025-08-07T08:23:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/socgholish-uses-parrot-and-keitaro-tds-to-spread-malware-via-fake-updates/</loc>
		<lastmod>2025-08-07T08:23:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/http-1-1-vulnerability-could-let-attackers-hijack-millions-of-sites/</loc>
		<lastmod>2025-08-07T08:23:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-how-to-stop-python-supply-chain-attacks-and-the-expert-tools-you-need/</loc>
		<lastmod>2025-08-07T08:23:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uberwachung-des-ki-markts-datenschutzer-mahnt-handeln-der-bundesregierung-bei-ki-an/</loc>
		<lastmod>2025-08-07T08:24:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agenten-modus-von-openai-wenn-die-ki-nicht-mehr-nur-hilft-sondern-handelt/</loc>
		<lastmod>2025-08-07T08:24:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trotz-warnung-cybergang-klaut-daten-aus-salesforce-instanz-von-google/</loc>
		<lastmod>2025-08-07T08:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-solutions-to-watch-after-black-hat-usa-2025/</loc>
		<lastmod>2025-08-07T09:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/air-france-and-klm-disclose-data-breaches-impacting-customers/</loc>
		<lastmod>2025-08-07T09:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-calls-attack-exploits-web-conferencing-as-hidden-commandcontrol-channel/</loc>
		<lastmod>2025-08-07T09:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heartcrypt-packed-avkiller-tool-actively-deployed-in-ransomware-attacks-to-disable-edr/</loc>
		<lastmod>2025-08-07T09:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-active-directory-attack-method-bypasses-authentication-to-steal-data/</loc>
		<lastmod>2025-08-07T09:21:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-denies-presence-of-backdoors-kill-switches-or-spyware-in-its-chips/</loc>
		<lastmod>2025-08-07T09:21:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-attacks-linked-to-legacy-bug-and-password-use/</loc>
		<lastmod>2025-08-07T09:22:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-stellt-agentenbasierte-cloud-sicherheitslosung-mit-semantischer-analyse-vor/</loc>
		<lastmod>2025-08-07T09:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amnesty-slams-elon-musks-x-for-central-role-in-fueling-2024-uk-riots/</loc>
		<lastmod>2025-08-07T09:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-2-million-healthcare-devices-and-systems-found-exposed-online-patient-records-at-risk-of-exposure-latest-research-from-modat/</loc>
		<lastmod>2025-08-07T09:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-ransomware-groups-are-using-tool-to-kill-edr-defenses-sophos/</loc>
		<lastmod>2025-08-07T10:20:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-coast-guard-hunt-engagement-offer-path-to-protect-critical-infrastructure/</loc>
		<lastmod>2025-08-07T10:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-authenticate-openai-operator-requests-using-http-message-signatures/</loc>
		<lastmod>2025-08-07T10:20:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-statt-digitaler-naivitat-europas-it-sicherheitsstrategie-auf-dem-prufstand/</loc>
		<lastmod>2025-08-07T10:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-confirms-salesforce-database-breach-by-shinyhunters-group/</loc>
		<lastmod>2025-08-07T10:21:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-alarmed-by-uk-governments-companies-house-id-checks/</loc>
		<lastmod>2025-08-07T10:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mfa-ist-nicht-gleich-mfa-warum-fido2-die-zukunft-der-authentifizierung-ist/</loc>
		<lastmod>2025-08-07T10:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalisierung-auf-sand-gebaut-wie-ki-euphorie-die-it-security-im-mittelstand-gefahrdet/</loc>
		<lastmod>2025-08-07T10:21:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quellen-tku-regelung-zu-staatstrojanern-teilweise-verfassungswidrig/</loc>
		<lastmod>2025-08-07T10:21:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-home-mit-google-gemini-fremde-jalousien-per-kalendereinladung-gesteuert/</loc>
		<lastmod>2025-08-07T10:21:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/match-or-trap-online-dating-scams-and-other-dangers-to-know/</loc>
		<lastmod>2025-08-07T11:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-the-lifecycle-of-secrets-defines-your-security-posture/</loc>
		<lastmod>2025-08-07T11:20:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstellen-in-lenovo-uefi-und-dell-notebooks/</loc>
		<lastmod>2025-08-07T11:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-promptware-attack-hijacks-users-gemini-ai-via-google-calendar-invite/</loc>
		<lastmod>2025-08-07T11:20:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-ua-warns-of-uac-0099-phishing-attacks-targeting-ukraines-defense-sector/</loc>
		<lastmod>2025-08-07T11:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-iptv-piracy-service-with-28000-channels-taken-offline/</loc>
		<lastmod>2025-08-07T11:21:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akamai-ghost-platform-flaw-allows-hidden-second-request-injection/</loc>
		<lastmod>2025-08-07T11:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grundlagen-fur-eine-sichere-cloud-infrastruktur-aws-iam-als-schlussel-zur-cloud-sicherheit/</loc>
		<lastmod>2025-08-07T11:21:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/belgien-polizei-verteilt-brottuten-mit-cybersecurity-tipps/</loc>
		<lastmod>2025-08-07T11:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weg-von-windows-linux-auf-business-desktops-und-notebooks-immer-beliebter/</loc>
		<lastmod>2025-08-07T11:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-vault-cyberark-conjur-kompromittiert/</loc>
		<lastmod>2025-08-07T12:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-hits-frances-third-largest-mobile-operator-millions-of-customers-affected/</loc>
		<lastmod>2025-08-07T12:21:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-vault-cyberark-conjur-kompromittiert-2/</loc>
		<lastmod>2025-08-07T12:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-schliest-ubernahme-von-red-canary-ab-und-forciert-agentenbasierte-ki-gesteuerte-security-operations/</loc>
		<lastmod>2025-08-07T12:21:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-hits-frances-third-largest-mobile-operator-millions-of-customers-affected-2/</loc>
		<lastmod>2025-08-07T12:22:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-vault-cyberark-conjur-kompromittiert-3/</loc>
		<lastmod>2025-08-07T12:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-how-deepfake-vishing-attacks-work-and-why-they-can-be-hard-to-detect/</loc>
		<lastmod>2025-08-07T12:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-schliest-ubernahme-von-red-canary-ab-und-forciert-agentenbasierte-ki-gesteuerte-security-operations-2/</loc>
		<lastmod>2025-08-07T12:22:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-how-deepfake-vishing-attacks-work-and-why-they-can-be-hard-to-detect-2/</loc>
		<lastmod>2025-08-07T12:23:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-hits-frances-third-largest-mobile-operator-millions-of-customers-affected-3/</loc>
		<lastmod>2025-08-07T12:23:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-target-chanel-in-salesforce-linked-data-breach/</loc>
		<lastmod>2025-08-07T12:23:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-target-chanel-in-salesforce-linked-data-breach-2/</loc>
		<lastmod>2025-08-07T12:23:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accuknox-partners-with-secuverse-ai-to-deliver-zero-trust-cnapp-security-for-national-gaming-infrastructure/</loc>
		<lastmod>2025-08-07T12:25:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-2025-von-der-ki-spielerei-zum-hackertool/</loc>
		<lastmod>2025-08-07T12:25:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accuknox-partners-with-secuverse-ai-to-deliver-zero-trust-cnapp-security-for-national-gaming-infrastructure-2/</loc>
		<lastmod>2025-08-07T12:26:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-discloses-exchange-server-flaw-enabling-silent-cloud-access-in-hybrid-setups/</loc>
		<lastmod>2025-08-07T12:26:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-2025-von-der-ki-spielerei-zum-hackertool-2/</loc>
		<lastmod>2025-08-07T12:27:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-project-ire-ai-that-autonomously-detects-malware/</loc>
		<lastmod>2025-08-07T12:27:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accuknox-partners-with-secuverse-ai-to-deliver-zero-trust-cnapp-security-for-national-gaming-infrastructure-3/</loc>
		<lastmod>2025-08-07T12:27:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-2025-von-der-ki-spielerei-zum-hackertool-3/</loc>
		<lastmod>2025-08-07T12:27:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-discloses-exchange-server-flaw-enabling-silent-cloud-access-in-hybrid-setups-2/</loc>
		<lastmod>2025-08-07T12:27:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-discloses-exchange-server-flaw-enabling-silent-cloud-access-in-hybrid-setups-3/</loc>
		<lastmod>2025-08-07T12:27:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-project-ire-ai-that-autonomously-detects-malware-2/</loc>
		<lastmod>2025-08-07T12:27:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-powered-security-shift-what-2025-is-teaching-us-about-cloud-defense/</loc>
		<lastmod>2025-08-07T12:27:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-project-ire-ai-that-autonomously-detects-malware-3/</loc>
		<lastmod>2025-08-07T12:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-powered-security-shift-what-2025-is-teaching-us-about-cloud-defense-2/</loc>
		<lastmod>2025-08-07T12:28:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-attackers-did-not-exploit-zero-day-vulnerability-to-compromise-gen-7-firewalls/</loc>
		<lastmod>2025-08-07T12:28:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptomixer-founders-pled-guilty-to-laundering-money-for-cybercriminals/</loc>
		<lastmod>2025-08-07T12:29:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accuknox-partners-with-secuverse-ai-to-deliver-zero-trust-cnapp-security-for-national-gaming-infrastructure-4/</loc>
		<lastmod>2025-08-07T12:29:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-attackers-did-not-exploit-zero-day-vulnerability-to-compromise-gen-7-firewalls-2/</loc>
		<lastmod>2025-08-07T12:29:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-confirms-patched-vulnerability-behind-recent-vpn-attacks-not-a-zero-day/</loc>
		<lastmod>2025-08-07T12:29:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptomixer-founders-pled-guilty-to-laundering-money-for-cybercriminals-2/</loc>
		<lastmod>2025-08-07T12:29:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accuknox-partners-with-secuverse-ai-to-deliver-zero-trust-cnapp-security-for-national-gaming-infrastructure-5/</loc>
		<lastmod>2025-08-07T12:30:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-microsoft-issue-alerts-on-high-severity-exchange-vulnerability/</loc>
		<lastmod>2025-08-07T13:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irgc-linked-hackers-target-financial-government-and-media-organizations/</loc>
		<lastmod>2025-08-07T13:20:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-ire-microsofts-autonomous-ai-agent-that-can-reverse-engineer-malware/</loc>
		<lastmod>2025-08-07T13:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versa-networks-ermoglicht-souveranes-sase-fur-swisscom/</loc>
		<lastmod>2025-08-07T13:20:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-und-rubrik-starken-gemeinsam-die-cyberresilienz-von-microsoft-365/</loc>
		<lastmod>2025-08-07T13:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-training-ai-on-social-media-posts-only-7-in-europe-think-its-ok/</loc>
		<lastmod>2025-08-07T13:21:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-ai-exploited-via-google-invite-prompt-injection-to-steal-sensitive-user-data/</loc>
		<lastmod>2025-08-07T13:21:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-legitimate-drivers-to-disable-antivirus-and-weaken-system-defenses/</loc>
		<lastmod>2025-08-07T13:21:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researcher-deploys-fuzzer-to-test-autonomous-vehicle-safety/</loc>
		<lastmod>2025-08-07T13:22:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-acquires-ai-startup-prompt-security/</loc>
		<lastmod>2025-08-07T13:22:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-too-were-breached-says-google-months-after-revealing-salesforce-attacks/</loc>
		<lastmod>2025-08-07T13:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-online-writing-platforms-with-passwordless-authentication/</loc>
		<lastmod>2025-08-07T14:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-overlooked-part-of-sales-funnels-how-mojoauth-secures-lemlist-alternative-platforms/</loc>
		<lastmod>2025-08-07T14:20:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-french-telecom-giant-bouygues-affects-millions-of-customers/</loc>
		<lastmod>2025-08-07T14:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teaonher-a-rival-tea-app-for-men-is-leaking-users-personal-data-and-drivers-licenses/</loc>
		<lastmod>2025-08-07T14:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pci-4-0-konformitat-sicherstellen-durch-file-integrity-monitoring-fur-container/</loc>
		<lastmod>2025-08-07T14:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/klm-air-france-latest-major-organizations-looted-for-customer-data/</loc>
		<lastmod>2025-08-07T14:21:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponizing-microsoft-365-direct-send-to-bypass-email-security-defenses/</loc>
		<lastmod>2025-08-07T14:21:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-toolshell-exploitation-chain-targeting-sharepoint-servers-iocs-and-detections-released/</loc>
		<lastmod>2025-08-07T14:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-critical-flaw-in-cve-scoring/</loc>
		<lastmod>2025-08-07T14:21:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chanel-alerts-clients-of-third-party-breach/</loc>
		<lastmod>2025-08-07T14:21:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-go-npm-packages-deliver-cross-platform-malware-trigger-remote-data-wipes/</loc>
		<lastmod>2025-08-07T14:22:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6500-axis-servers-expose-remoting-protocol-4000-in-u-s-vulnerable-to-exploits/</loc>
		<lastmod>2025-08-07T14:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-microsoft-exchange-vulnerability-puts-hybrid-cloud-environments-at-risk/</loc>
		<lastmod>2025-08-07T14:22:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-among-victims-in-ongoing-salesforce-data-theft-campaign/</loc>
		<lastmod>2025-08-07T14:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-ai-era-sonatype-safeguards-open-source-software-supply-chains/</loc>
		<lastmod>2025-08-07T15:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-essential-questions-for-your-workforce-identity-verification-idv-vendor/</loc>
		<lastmod>2025-08-07T15:20:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-aws-security-partnership-5-latest-moves/</loc>
		<lastmod>2025-08-07T15:20:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-ist-haupteinfallstor-in-2025/</loc>
		<lastmod>2025-08-07T15:20:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubrik-und-sophos-starken-gemeinsam-die-cyberresilienz-von-microsoft-365/</loc>
		<lastmod>2025-08-07T15:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-erweitert-agentische-ki-zur-abwehr-ki-gestutzter-bedrohungen/</loc>
		<lastmod>2025-08-07T15:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-malware-analysis-for-sharepoint-server-attack/</loc>
		<lastmod>2025-08-07T15:21:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/could-agentic-ai-save-us-from-the-cybercrisis/</loc>
		<lastmod>2025-08-07T15:21:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-confirms-salesforce-data-breach-by-shinyhunters-via-vishing-scam/</loc>
		<lastmod>2025-08-07T15:21:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-microsoft-warn-of-critical-exchange-hybrid-flaw-cve-2025-53786/</loc>
		<lastmod>2025-08-07T15:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-urges-admins-to-plug-severe-exchange-security-hole-cve-2025-53786/</loc>
		<lastmod>2025-08-07T15:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponized-npm-packages-target-whatsapp-developers-with-remote-kill-switch/</loc>
		<lastmod>2025-08-07T15:22:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forrester-und-google-unternehmen-kampfen-mit-fehlenden-threat-analysten/</loc>
		<lastmod>2025-08-07T15:22:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-cracks-the-code-vcf-9-0-delivers-enterprise-security-without-operational-sacrifice/</loc>
		<lastmod>2025-08-07T16:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-growing-b2b-company-shouldnt-build-ai-infrastructure-and-what-to-do-instead/</loc>
		<lastmod>2025-08-07T16:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-says-recent-attack-wave-involved-previously-disclosed-flaw-not-zero-day/</loc>
		<lastmod>2025-08-07T16:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-firewall-refresh-results-have-been-disappointing-analysts/</loc>
		<lastmod>2025-08-07T16:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-microsoft-warn-organizations-of-high-severity-microsoft-exchange-vulnerability/</loc>
		<lastmod>2025-08-07T16:20:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-finds-no-sslvpn-zero-day-links-ransomware-attacks-to-2024-flaw/</loc>
		<lastmod>2025-08-07T16:21:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wave-of-150-crypto-draining-extensions-hits-firefox-add-on-store/</loc>
		<lastmod>2025-08-07T16:21:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-extradited-to-u-s-for-2-5-million-tax-fraud-scheme/</loc>
		<lastmod>2025-08-07T16:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scarcruft-hacker-group-launches-new-rust-based-malware-attack-leveraging-pubnub/</loc>
		<lastmod>2025-08-07T16:21:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startup-spotlight-twine-security-tackles-the-execution-gap/</loc>
		<lastmod>2025-08-07T16:21:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bhusa-microsoft-debuts-ai-agent-able-to-reverse-engineer-malware/</loc>
		<lastmod>2025-08-07T16:22:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/were-a-major-player-in-the-2025-idc-marketscape-for-cnapp-heres-why-that-matters-for-your-cloud-security/</loc>
		<lastmod>2025-08-07T17:19:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-license-non-compliance-is-expensive/</loc>
		<lastmod>2025-08-07T17:19:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-the-genai-security-crisis-few-can-see-but-these-startups-are-mapping-the-gaps/</loc>
		<lastmod>2025-08-07T17:19:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-has-high-confidence-attacks-did-not-exploit-zero-day-flaw/</loc>
		<lastmod>2025-08-07T17:20:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hack-to-the-future-slides-and-content/</loc>
		<lastmod>2025-08-07T17:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airlines-klm-and-air-france-detail-customer-data-breach/</loc>
		<lastmod>2025-08-07T17:20:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/context-security-continues-to-deliver-for-distribution-in-h1/</loc>
		<lastmod>2025-08-07T17:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6500-axis-servers-expose-remoting-protocol-4000-in-u-s-vulnerable-to-exploits-2/</loc>
		<lastmod>2025-08-07T17:21:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-has-high-confidence-attacks-did-not-exploit-zero-day-flaw-2/</loc>
		<lastmod>2025-08-07T17:21:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-breached-what-we-know-what-theyre-saying/</loc>
		<lastmod>2025-08-07T18:19:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/probably-secure-a-look-at-the-security-concerns-of-deterministic-vs-probabilistic-systems/</loc>
		<lastmod>2025-08-07T18:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-cisa-warn-yet-another-exchange-server-bug-can-lead-to-total-domain-compromise/</loc>
		<lastmod>2025-08-07T18:19:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-verdict-in-tornado-cash-founders-case/</loc>
		<lastmod>2025-08-07T18:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-gpt5-means-for-it-teams-devs-and-the-future-of-ai-at-work/</loc>
		<lastmod>2025-08-07T18:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-edr-killer-tool-used-by-eight-different-ransomware-groups/</loc>
		<lastmod>2025-08-07T18:20:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bouygues-telecom-confirms-data-breach-impacting-6-4-million-customers/</loc>
		<lastmod>2025-08-07T18:20:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-svg-files-with-embedded-javascript-to-deploy-malware-on-windows-systems/</loc>
		<lastmod>2025-08-07T18:21:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payback-shinyhunters-clocks-google-via-salesforce/</loc>
		<lastmod>2025-08-07T18:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-error-lessons-from-the-2006-va-data-breach/</loc>
		<lastmod>2025-08-07T19:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-wrote-my-code-and-all-i-got-was-this-broken-prototype/</loc>
		<lastmod>2025-08-07T19:20:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mysterious-crime-spree-targeted-national-guard-equipment-stashes/</loc>
		<lastmod>2025-08-07T19:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/encryption-made-for-police-and-military-radios-may-be-easily-cracked/</loc>
		<lastmod>2025-08-07T19:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-vault-0-day-flaws-enable-remote-code-execution-attacks/</loc>
		<lastmod>2025-08-07T19:20:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/splunk-unveils-plob-tool-to-detect-compromised-credential-usage/</loc>
		<lastmod>2025-08-07T19:21:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samourai-cryptomixer-founders-plead-guilty-to-money-laundering/</loc>
		<lastmod>2025-08-07T19:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citizen-lab-founder-flags-rise-of-us-authoritarianism/</loc>
		<lastmod>2025-08-07T19:21:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/socgholish-malware-spread-via-ad-tools-delivers-access-to-lockbit-evil-corp-and-others/</loc>
		<lastmod>2025-08-07T19:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-many-organizations-hit-by-ransomware-fall-victim-multiple-times/</loc>
		<lastmod>2025-08-07T20:19:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrid-exchange-environment-vulnerability-needs-fast-action/</loc>
		<lastmod>2025-08-07T20:19:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germanys-top-court-holds-that-police-can-only-use-spyware-to-investigate-serious-crimes/</loc>
		<lastmod>2025-08-07T20:19:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksuit-royal-ransomware-group-hit-over-450-us-victims-before-last-months-takedown/</loc>
		<lastmod>2025-08-07T20:19:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpts-gpt-5-models-released-everything-you-need-to-know/</loc>
		<lastmod>2025-08-07T20:19:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-red-teaming-companies-for-advanced-attack-simulation-in-2025/</loc>
		<lastmod>2025-08-07T20:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-machine-learning-detects-living-off-the-land-lotl-attacks/</loc>
		<lastmod>2025-08-07T20:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-effective-handling-of-third-party-supplier-incidents/</loc>
		<lastmod>2025-08-07T21:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-is-vulnerability-management-dead-a-security-architects-survival-guide/</loc>
		<lastmod>2025-08-07T21:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-discovered-a-new-scam-and-also-fell-victim-to-it/</loc>
		<lastmod>2025-08-07T21:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-hybrid-exchange-deployment-flaw/</loc>
		<lastmod>2025-08-07T21:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-fed-agencies-to-patch-new-exchange-flaw-by-monday/</loc>
		<lastmod>2025-08-07T21:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privilege-escalation-issue-in-amazon-ecs-leads-to-iam-hijacking/</loc>
		<lastmod>2025-08-07T21:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bhusa-1000-dod-contractors-now-covered-by-nsas-free-cyber-services-program/</loc>
		<lastmod>2025-08-07T21:21:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reveal-security-unveils-preemptive-approach-to-securing-applications-and-cloud-services/</loc>
		<lastmod>2025-08-07T22:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-server-hybrid-durch-cve-2025-53786-gefahrdet/</loc>
		<lastmod>2025-08-07T22:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-chinese-duo-held-for-illegal-ai-chip-exports/</loc>
		<lastmod>2025-08-07T22:20:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-pushes-back-on-chinese-kill-switch-claims/</loc>
		<lastmod>2025-08-07T22:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-new-york-times-cyber-reporter-issues-chilling-warning-at-black-hat/</loc>
		<lastmod>2025-08-07T22:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reveal-security-unveils-preemptive-approach-to-securing-applications-and-cloud-services-2/</loc>
		<lastmod>2025-08-07T22:21:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-server-hybrid-durch-cve-2025-53786-gefahrdet-2/</loc>
		<lastmod>2025-08-07T22:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-whatsapp-developer-libraries-hide-destructive-data-wiping-code/</loc>
		<lastmod>2025-08-07T22:22:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/air-france-klm-alert-authorities-of-data-breach/</loc>
		<lastmod>2025-08-07T22:22:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-your-web-applications-against-the-owasp-top-10/</loc>
		<lastmod>2025-08-07T23:20:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-d-edge-cut-bot-traffic-by-75-reclaimed-platform-performance-with-datadome/</loc>
		<lastmod>2025-08-07T23:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicheres-vertragsmanagement-digitale-souveranitat-als-notwendigkeit/</loc>
		<lastmod>2025-08-07T23:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenlecks-bei-air-france-klm/</loc>
		<lastmod>2025-08-07T23:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdachtiger-google-konto-zugriff-liegt-es-am-google-remote-desktop/</loc>
		<lastmod>2025-08-07T23:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/air-france-and-klm-disclosed-data-breaches-following-the-hack-of-a-third-party-platform/</loc>
		<lastmod>2025-08-07T23:21:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axis-security-camera-flaws-enable-remote-takeover/</loc>
		<lastmod>2025-08-07T23:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unitedhealth-groups-latest-health-data-breach-woes/</loc>
		<lastmod>2025-08-07T23:21:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-8m-whatsapp-accounts-shut-down-in-metas-fight-against-scam-networks/</loc>
		<lastmod>2025-08-07T23:21:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cmmc-final-rule-clear-steps-for-dod-contractors/</loc>
		<lastmod>2025-08-08T03:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-center-security/</loc>
		<lastmod>2025-08-08T03:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-kasada-an-interns-dive-into-bots-data-and-company-culture/</loc>
		<lastmod>2025-08-08T03:20:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-network-security/</loc>
		<lastmod>2025-08-08T03:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-personas-deepfakes-and-the-collapse-of-trust-part-2/</loc>
		<lastmod>2025-08-08T03:21:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-2025-recap-a-look-at-new-offerings-announced-at-the-show/</loc>
		<lastmod>2025-08-08T03:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-confirms-takedown-of-blacksuit-ransomware-gang-that-racked-up-370-million-in-ransoms/</loc>
		<lastmod>2025-08-08T03:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-courts-to-ramp-up-filing-system-security-after-recent-escalated-cyberattacks/</loc>
		<lastmod>2025-08-08T03:21:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/network-scans-find-linux-is-growing-on-business-desktops-laptops/</loc>
		<lastmod>2025-08-08T03:21:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leak-reveals-the-workaday-lives-of-north-korean-it-scammers/</loc>
		<lastmod>2025-08-08T03:22:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-microsofts-real-time-war-against-cybersecurity-threats/</loc>
		<lastmod>2025-08-08T03:22:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-keeps-cyber-experts-up-at-night-techrepublic-goes-inside-black-hat-25/</loc>
		<lastmod>2025-08-08T03:22:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-apt-blurs-the-line-between-espionage-cybercrime/</loc>
		<lastmod>2025-08-08T03:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jedes-dritte-opfer-von-ransomware-wird-mehrfach-angegriffen-da-sicherheitslucken-nicht-geschlossen-werden/</loc>
		<lastmod>2025-08-08T04:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-prinzipien-fur-den-mittelstand-it-sicherheit-mit-struktur/</loc>
		<lastmod>2025-08-08T04:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriff-erkannt-konto-verloren-warum-logdateien-allein-nicht-mehr-ausreichen/</loc>
		<lastmod>2025-08-08T04:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jedes-dritte-opfer-von-ransomware-wird-mehrfach-angegriffen-da-sicherheitslucken-nicht-geschlossen-werden-2/</loc>
		<lastmod>2025-08-08T04:20:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-sparen-cisos-ohne-die-sicherheit-zu-torpedieren/</loc>
		<lastmod>2025-08-08T05:19:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-controls-dont-guarantee-consumer-trust/</loc>
		<lastmod>2025-08-08T05:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-august-8-2025/</loc>
		<lastmod>2025-08-08T05:19:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-sparen-cisos-ohne-die-sicherheit-zu-torpedieren-2/</loc>
		<lastmod>2025-08-08T05:20:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-5-launches-discover-whats-new-in-the-next-gen-ai-agent/</loc>
		<lastmod>2025-08-08T05:20:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decoding-otp-a-deep-dive-into-hotp-and-totp-algorithms/</loc>
		<lastmod>2025-08-08T06:20:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jedes-dritte-opfer-wird-mehrfach-angegriffen/</loc>
		<lastmod>2025-08-08T06:20:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decoding-otp-a-deep-dive-into-hotp-and-totp-algorithms-2/</loc>
		<lastmod>2025-08-08T06:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-speicher-lifetime-deal-sichere-dir-diesen-online-speicher-vpn-und-virenschutz-mit-87-rabatt/</loc>
		<lastmod>2025-08-08T06:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jedes-dritte-opfer-wird-mehrfach-angegriffen-2/</loc>
		<lastmod>2025-08-08T06:21:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-ein-ol-und-gasunternehmen-in-pakistan/</loc>
		<lastmod>2025-08-08T06:22:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decoding-otp-a-deep-dive-into-hotp-and-totp-algorithms-3/</loc>
		<lastmod>2025-08-08T06:22:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-speicher-lifetime-deal-sichere-dir-diesen-online-speicher-vpn-und-virenschutz-mit-87-rabatt-2/</loc>
		<lastmod>2025-08-08T06:22:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-konto-einer-organisation-zum-schutz-von-elefanten-gehackt/</loc>
		<lastmod>2025-08-08T06:22:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jedes-dritte-opfer-wird-mehrfach-angegriffen-3/</loc>
		<lastmod>2025-08-08T06:23:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-ein-ol-und-gasunternehmen-in-pakistan-2/</loc>
		<lastmod>2025-08-08T06:23:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decoding-otp-a-deep-dive-into-hotp-and-totp-algorithms-4/</loc>
		<lastmod>2025-08-08T06:23:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-konto-einer-organisation-zum-schutz-von-elefanten-gehackt-2/</loc>
		<lastmod>2025-08-08T06:24:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-stadtverwaltung-in-maine-usa/</loc>
		<lastmod>2025-08-08T06:25:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-konto-einer-organisation-zum-schutz-von-elefanten-gehackt-3/</loc>
		<lastmod>2025-08-08T06:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbefugter-zugriff-bei-einem-globalen-it-unternehmen/</loc>
		<lastmod>2025-08-08T06:25:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eine-stadtverwaltung-in-maine-usa-2/</loc>
		<lastmod>2025-08-08T06:26:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-party-partners-or-ticking-time-bombs/</loc>
		<lastmod>2025-08-08T06:26:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-fake-captchas-to-rats-inside-2025s-cyber-deception-threat-trends/</loc>
		<lastmod>2025-08-08T06:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbefugter-zugriff-bei-einem-globalen-it-unternehmen-2/</loc>
		<lastmod>2025-08-08T06:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-party-partners-or-ticking-time-bombs-2/</loc>
		<lastmod>2025-08-08T06:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-konto-einer-organisation-zum-schutz-von-elefanten-gehackt-4/</loc>
		<lastmod>2025-08-08T06:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flipper-zero-dark-web-firmware-cracks-rolling-code-security-in-modern-cars/</loc>
		<lastmod>2025-08-08T06:27:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-urgent-advisory-to-address-microsoft-exchange-flaw/</loc>
		<lastmod>2025-08-08T06:28:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flipper-zero-dark-web-firmware-cracks-rolling-code-security-in-modern-cars-2/</loc>
		<lastmod>2025-08-08T06:28:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retbleed-vulnerability-exploited-to-access-any-processs-memory-on-newer-cpus/</loc>
		<lastmod>2025-08-08T06:28:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-urgent-advisory-to-address-microsoft-exchange-flaw-2/</loc>
		<lastmod>2025-08-08T06:29:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vollstandige-systemubernahme-moglich-kritische-schwachstellen-in-nvidia-triton-bedroht-ki-infrastrukturen/</loc>
		<lastmod>2025-08-08T06:29:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retbleed-vulnerability-exploited-to-access-any-processs-memory-on-newer-cpus-2/</loc>
		<lastmod>2025-08-08T06:30:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-ciso-the-top-it-security-leader-role-explained/</loc>
		<lastmod>2025-08-08T07:20:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bverfg-urteil-zu-staatstrojanern-eco-begrust-klarstellung/</loc>
		<lastmod>2025-08-08T07:20:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/august-2025-patch-tuesday-forecast-try-try-again/</loc>
		<lastmod>2025-08-08T07:20:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-resilienz-starken-it-security-profitiert-vom-neuen-barrierefreiheitsstarkungsgesetz/</loc>
		<lastmod>2025-08-08T07:21:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-new-model-cant-believe-that-trump-is-back-in-office/</loc>
		<lastmod>2025-08-08T08:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-geo-spoofing-with-secure-api-integration-for-mobile-application-2/</loc>
		<lastmod>2025-08-08T08:21:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-dismisses-zero-day-fears-after-ransomware-probe/</loc>
		<lastmod>2025-08-08T08:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/royal-and-blacksuit-ransomware-gangs-hit-over-450-us-companies/</loc>
		<lastmod>2025-08-08T08:23:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-go-packages-used-by-threat-actors-to-deploy-obfuscated-remote-payloads/</loc>
		<lastmod>2025-08-08T08:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-60-malicious-rubygems-packages-used-to-steal-social-media-and-marketing-credentials/</loc>
		<lastmod>2025-08-08T08:23:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privatnutzer-esu-lizenz-fur-windows-10-gilt-fur-mehrere-pcs/</loc>
		<lastmod>2025-08-08T08:23:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-dismisses-zero-day-fears-after-ransomware-probe-2/</loc>
		<lastmod>2025-08-08T08:24:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-geo-spoofing-with-secure-api-integration-for-mobile-application/</loc>
		<lastmod>2025-08-08T08:20:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silent-guardian-of-your-codebase-the-role-of-sast/</loc>
		<lastmod>2025-08-08T08:20:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-53786-frequently-asked-questions-about-microsoft-exchange-server-hybrid-deployment-elevation-of-privilege-vulnerability/</loc>
		<lastmod>2025-08-08T08:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staatstrojaner-einsatz-wird-eingeschrankt-digitalcourage-meldet-erfolg-vor-bundesverfassungsgericht/</loc>
		<lastmod>2025-08-08T08:21:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-lesson-of-black-hat-its-about-the-people-stupid/</loc>
		<lastmod>2025-08-08T09:20:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/still-dangerous-after-all-these-years/</loc>
		<lastmod>2025-08-08T09:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/august-2025-patch-tuesday-forecast-try-try-again-2/</loc>
		<lastmod>2025-08-08T09:20:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/columbia-university-data-breach-impacts-nearly-870000-individuals/</loc>
		<lastmod>2025-08-08T09:20:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-confirms-takedown-of-blacksuit-ransomware-behind-450-hacks/</loc>
		<lastmod>2025-08-08T09:21:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-ecs-internal-protocol-exploited-to-steal-aws-credentials-from-other-tasks/</loc>
		<lastmod>2025-08-08T09:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greedybear-steals-1m-in-crypto-using-150-malicious-firefox-wallet-extensions/</loc>
		<lastmod>2025-08-08T09:21:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bouygues-telecom-data-breach-exposes-6-4-million-customer-records/</loc>
		<lastmod>2025-08-08T09:21:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/urteile-des-bundesverfassungsgerichts-karlsruhe-nrw-polizeigesetz-bestatigt-aber-staatstrojaner-einsatz-beschrankt/</loc>
		<lastmod>2025-08-08T09:22:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-erweitert-hrm-um-agentische-ki-fahigkeiten/</loc>
		<lastmod>2025-08-08T09:22:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-officials-say-agency-is-moving-ahead-despite-workforce-purge/</loc>
		<lastmod>2025-08-08T10:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-produkt-highlights-der-black-hat-usa/</loc>
		<lastmod>2025-08-08T10:20:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teaonher-copies-everything-from-tea-including-the-data-breaches/</loc>
		<lastmod>2025-08-08T10:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-proxy-traffic-surges-as-users-consider-vpn-alternatives-amid-online-safety-act/</loc>
		<lastmod>2025-08-08T10:20:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-closes-gap-to-artificial-general-intelligence-with-gpt-5/</loc>
		<lastmod>2025-08-08T10:20:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-10-ics-advisories-detailing-vulnerabilities-and-exploits/</loc>
		<lastmod>2025-08-08T10:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-federal-judiciary-tightens-security-following-escalated-cyber-attacks/</loc>
		<lastmod>2025-08-08T10:21:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incident-response-unter-zeitdruck-angriff-abwehren-mit-incident-response-plan/</loc>
		<lastmod>2025-08-08T10:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartphone-entflammt-lg-muss-fur-hausbrand-170-000-euro-zahlen/</loc>
		<lastmod>2025-08-08T10:21:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-secretly-allows-facial-recognition-scans-of-passport-immigration-databases/</loc>
		<lastmod>2025-08-08T11:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-apps-to-soon-block-file-access-via-fprpc-by-default/</loc>
		<lastmod>2025-08-08T11:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-will-kill-the-lens-pdf-scanner-app-for-ios-android/</loc>
		<lastmod>2025-08-08T11:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/komplettlosung-fur-datenrettung-systemreparatur-und-passwort-wiederherstellung-lazesoft-windows-recovery-stellt-windows-wieder-her/</loc>
		<lastmod>2025-08-08T11:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-untersucht-angriffe-durch-kombination-aus-mehreren-ransomwares/</loc>
		<lastmod>2025-08-08T11:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-monthly-apt-insights-june-2025/</loc>
		<lastmod>2025-08-08T12:20:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-cryptocurrency-blockchain-101-for-cisos-and-why-it-matters/</loc>
		<lastmod>2025-08-08T12:20:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-monthly-apt-insights-june-2025-2/</loc>
		<lastmod>2025-08-08T12:21:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greedybear-40-fake-crypto-wallet-extensions-found-on-firefox-marketplace/</loc>
		<lastmod>2025-08-08T12:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-cryptocurrency-blockchain-101-for-cisos-and-why-it-matters-2/</loc>
		<lastmod>2025-08-08T12:21:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-monthly-apt-insights-june-2025-3/</loc>
		<lastmod>2025-08-08T12:22:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/record-breaking-greedybear-attack-uses-650-hacking-tools-to-steal-1m-from-victims/</loc>
		<lastmod>2025-08-08T12:22:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-security-vulnerabilities-found-in-wwbn-avideo-meddream-and-eclipse-threadx/</loc>
		<lastmod>2025-08-08T12:22:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greedybear-40-fake-crypto-wallet-extensions-found-on-firefox-marketplace-2/</loc>
		<lastmod>2025-08-08T12:22:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-cryptocurrency-blockchain-101-for-cisos-and-why-it-matters-3/</loc>
		<lastmod>2025-08-08T12:22:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-uac-bypass-exploits-character-map-tool-for-privilege-escalation/</loc>
		<lastmod>2025-08-08T12:23:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-issues-advisory-to-prevent-zip-parser-confusion-attacks-on-python-package-installers/</loc>
		<lastmod>2025-08-08T12:24:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-uac-bypass-exploits-character-map-tool-for-privilege-escalation-2/</loc>
		<lastmod>2025-08-08T12:24:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaked-credentials-up-160-what-attackers-are-doing-with-them/</loc>
		<lastmod>2025-08-08T12:24:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubygems-pypi-hit-by-malicious-packages-stealing-credentials-crypto-forcing-security-changes/</loc>
		<lastmod>2025-08-08T12:25:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-issues-advisory-to-prevent-zip-parser-confusion-attacks-on-python-package-installers-2/</loc>
		<lastmod>2025-08-08T12:25:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-uac-bypass-exploits-character-map-tool-for-privilege-escalation-3/</loc>
		<lastmod>2025-08-08T12:25:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-2025-hacker-demonstrieren-cyberangriff-auf-satelliten-der-nasa/</loc>
		<lastmod>2025-08-08T12:25:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaked-credentials-up-160-what-attackers-are-doing-with-them-2/</loc>
		<lastmod>2025-08-08T12:25:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-du-deine-e-mails-sichern-solltest-und-wie-das-geht/</loc>
		<lastmod>2025-08-08T12:26:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-ai-agents-are-now-biggest-threat-to-cybersecurity/</loc>
		<lastmod>2025-08-08T13:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwords-resilience-and-being-human-working-together-for-a-brighter-future-at-bsides-las-vegas-2025/</loc>
		<lastmod>2025-08-08T13:21:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-ai-agents-are-now-biggest-threat-to-cybersecurity-2/</loc>
		<lastmod>2025-08-08T13:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ecscape-new-aws-ecs-flaw-lets-containers-hijack-iam-roles-without-breaking-out/</loc>
		<lastmod>2025-08-08T13:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwords-resilience-and-being-human-working-together-for-a-brighter-future-at-bsides-las-vegas-2025-2/</loc>
		<lastmod>2025-08-08T13:22:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/columbia-university-says-hacker-stole-ssns-and-other-data-of-nearly-900000/</loc>
		<lastmod>2025-08-08T13:22:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-ai-agents-are-now-biggest-threat-to-cybersecurity-3/</loc>
		<lastmod>2025-08-08T13:22:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ecscape-new-aws-ecs-flaw-lets-containers-hijack-iam-roles-without-breaking-out-2/</loc>
		<lastmod>2025-08-08T13:22:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-pledges-to-continue-backing-cve-program-after-april-funding-fiasco/</loc>
		<lastmod>2025-08-08T13:22:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/columbia-university-data-breach-exposes-personal-and-financial-data-of-870000/</loc>
		<lastmod>2025-08-08T13:23:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vextrio-tds-deploys-malicious-vpn-apps-on-google-play-and-app-store/</loc>
		<lastmod>2025-08-08T13:24:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-regulator-sues-optus-over-2022-data-breach/</loc>
		<lastmod>2025-08-08T13:24:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-vision-to-reality-ironscales-malwarebytes-elevate-msp-security/</loc>
		<lastmod>2025-08-08T14:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-looks-like-a-school-bathroom-smoke-detector-a-teen-hacker-showed-it-could-be-an-audio-bug/</loc>
		<lastmod>2025-08-08T14:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-target-the-foundations-of-crypto-smart-contracts/</loc>
		<lastmod>2025-08-08T14:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-partnering-with-cyber-firms-to-support-under-resourced-defense-contractors/</loc>
		<lastmod>2025-08-08T15:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-judiciary-tightens-digital-security-as-it-deals-with-escalated-cyberattacks/</loc>
		<lastmod>2025-08-08T15:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-cyber-espionage-group-scarcruft-adds-ransomware-in-recent-attack/</loc>
		<lastmod>2025-08-08T15:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/research-reveals-possible-privacy-gaps-in-apple-intelligences-data-handling/</loc>
		<lastmod>2025-08-08T15:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/calyxosstopp-privacy-android-stoppt-patches-nutzer-im-sicherheits-vakuum/</loc>
		<lastmod>2025-08-08T15:21:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cmmc-3-0-really-means-for-government-contractors/</loc>
		<lastmod>2025-08-08T15:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bhusa-cisa-execs-hopeful-for-extension-of-cybersecurity-information-sharing-act/</loc>
		<lastmod>2025-08-08T15:21:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zunehmender-missbrauch-von-sprachmodellen-ki-modelle-als-waffe-der-cyberkriminellen/</loc>
		<lastmod>2025-08-08T15:21:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tea-app-data-breach-fallout-a-new-app-with-security-flaws-and-lawsuits/</loc>
		<lastmod>2025-08-08T16:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/star-leaky-app-of-the-week-stardict/</loc>
		<lastmod>2025-08-08T16:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-judiciary-confirms-breach-of-court-electronic-records-service/</loc>
		<lastmod>2025-08-08T16:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/redefining-the-role-what-makes-a-ciso-great/</loc>
		<lastmod>2025-08-08T16:20:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-sees-drop-in-cybersecurity-spending-growth-rates/</loc>
		<lastmod>2025-08-08T17:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-using-ai-to-discover-silently-patched-vulnerabilities-in-open-source/</loc>
		<lastmod>2025-08-08T17:20:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/financially-motivated-cluster-a-key-player-in-toolshell-exploitation/</loc>
		<lastmod>2025-08-08T17:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-law-to-protect-journalists-from-spyware-takes-effect/</loc>
		<lastmod>2025-08-08T17:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-organization-without-a-response-plan-will-be-hit-harder-by-a-security-incident/</loc>
		<lastmod>2025-08-08T17:20:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-misconfiguration-that-haunts-corporate-streaming-platforms-could-expose-sensitive-data/</loc>
		<lastmod>2025-08-08T17:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axis-camera-server-vulnerabilities-expose-thousands-of-organizations-to-attack/</loc>
		<lastmod>2025-08-08T17:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vcf-9-0-live-patching-ends-maintenance-window-dread/</loc>
		<lastmod>2025-08-08T18:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-boosts-msp-tools-ai-in-endpoint-defense-upgrade/</loc>
		<lastmod>2025-08-08T18:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/msps-encouraged-to-tighten-up-security-defences/</loc>
		<lastmod>2025-08-08T18:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-older-adults-lost-record-700-million-to-scammers-in-2024/</loc>
		<lastmod>2025-08-08T18:20:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkcloud-stealer-targets-windows-systems-to-harvest-login-credentials-and-financial-data/</loc>
		<lastmod>2025-08-08T18:21:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vcf-9-0-live-patching-ends-maintenance-window-dread-2/</loc>
		<lastmod>2025-08-08T18:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-tools-fuel-brazilian-phishing-scam-while-efimer-trojan-steals-crypto-from-5000-victims/</loc>
		<lastmod>2025-08-08T18:22:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-attacks-the-silent-killer-of-uk-smbs-and-how-to-thwart-them/</loc>
		<lastmod>2025-08-08T19:20:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/embargo-ransomware-gang-has-handled-at-least-34-million-in-about-a-year-report-says/</loc>
		<lastmod>2025-08-08T19:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faced-with-40b-budget-hole-uk-public-sector-commits-9b-to-microsoft/</loc>
		<lastmod>2025-08-08T19:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/columbia-university-data-breach-impacted-868969-people/</loc>
		<lastmod>2025-08-08T19:20:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-pitches-gpt-5-as-faster-smarter-more-accurate/</loc>
		<lastmod>2025-08-08T19:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-voice-phishing-attacks-breach-google-and-cisco/</loc>
		<lastmod>2025-08-08T19:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/otorio-buy-fuels-armis-ot-security-and-ai-driven-growth/</loc>
		<lastmod>2025-08-08T19:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-5000-fake-online-pharmacies-caught-selling-counterfeit-medicines/</loc>
		<lastmod>2025-08-08T19:22:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkcloud-stealer-uses-novel-infection-chain-and-confuserex-obfuscation-techniques/</loc>
		<lastmod>2025-08-08T19:23:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/860k-compromised-in-columbia-university-data-breach/</loc>
		<lastmod>2025-08-08T19:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adult-sites-are-stashing-exploit-code-inside-racy-svg-files/</loc>
		<lastmod>2025-08-08T20:20:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15000-jenkins-servers-at-risk-from-rce-vulnerability-cve-2025-53652/</loc>
		<lastmod>2025-08-08T20:20:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/typosquatted-pypi-packages-used-by-threat-actors-to-steal-cryptocurrency-from-bittensor-wallets/</loc>
		<lastmod>2025-08-08T20:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/efimer-malicious-script-spreads-via-wordpress-sites-torrents-and-email-in-massive-attack-wave/</loc>
		<lastmod>2025-08-08T20:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-security-program-might-be-failing-before-it-even-starts-az%c2%a5-sean-finley-az%c2%a5the-elephant-in-appsec-podcast/</loc>
		<lastmod>2025-08-08T21:20:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darpa-touts-value-of-ai-powered-vulnerability-detection-as-it-announces-competition-winners/</loc>
		<lastmod>2025-08-08T21:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-eventually-realized-the-world-isnt-just-the-northern-hemisphere/</loc>
		<lastmod>2025-08-08T21:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-went-looking-for-a-backdoor-in-high-security-safes-and-now-can-open-them-in-seconds/</loc>
		<lastmod>2025-08-08T21:20:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrar-zero-day-flaw-exploited-by-romcom-hackers-in-phishing-attacks/</loc>
		<lastmod>2025-08-08T21:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/60-rubygems-packages-steal-data-from-annoying-spammers/</loc>
		<lastmod>2025-08-08T21:21:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-cisa-analyzes-malware-used-in-sharepoint-attacks-as-u-k-boosts-cyber-assessment-framework/</loc>
		<lastmod>2025-08-08T22:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darpas-ai-cyber-challenge-reveals-winning-models-for-automated-vulnerability-discovery-and-patching/</loc>
		<lastmod>2025-08-08T22:21:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-cisa-analyzes-malware-used-in-sharepoint-attacks-as-u-k-boosts-cyber-assessment-framework-2/</loc>
		<lastmod>2025-08-08T22:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-privacy-regulator-sues-optus-over-2022-hack/</loc>
		<lastmod>2025-08-08T22:21:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-cyber-index-reveals-strengths-and-setbacks/</loc>
		<lastmod>2025-08-08T22:21:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insurance-firm-notifies-156k-victims-1-year-after-the-hack/</loc>
		<lastmod>2025-08-08T22:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-to-fix-gpt-5-issues-double-rate-limits-for-paid-users-after-outrage/</loc>
		<lastmod>2025-08-08T22:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrar-zero-day-exploited-to-plant-malware-on-archive-extraction/</loc>
		<lastmod>2025-08-08T22:22:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-2025-hacker-demonstrieren-angriff-auf-satelliten-der-nasa/</loc>
		<lastmod>2025-08-08T22:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darpa-announces-4-million-winner-of-ai-code-review-competition-at-def-con/</loc>
		<lastmod>2025-08-08T23:20:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-windows-hello-eher-nicht-fur-business-verwenden/</loc>
		<lastmod>2025-08-08T23:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-administration-unter-trump-macht-druck-auf-eu-wegen-digitalregeln/</loc>
		<lastmod>2025-08-08T23:20:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flora-schafer-hackt-die-bundeswehr-ein-bisschen/</loc>
		<lastmod>2025-08-08T23:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-firm-bouygues-telecom-suffered-a-data-breach-impacting-6-4m-customers/</loc>
		<lastmod>2025-08-08T23:20:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-dump-from-apt-actor-yields-clues-to-attacker-capabilities/</loc>
		<lastmod>2025-08-08T23:21:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cybersecurity-is-getting-better-with-nhis/</loc>
		<lastmod>2025-08-09T03:20:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-your-cybersecurity-handle-evolving-threats/</loc>
		<lastmod>2025-08-09T03:20:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/choosing-the-right-secrets-management-solution/</loc>
		<lastmod>2025-08-09T03:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exciting-advances-in-secrets-sprawl-management/</loc>
		<lastmod>2025-08-09T03:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-ai-agents-exploring-critical-threats-and-exploitation-techniques/</loc>
		<lastmod>2025-08-09T03:20:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-geologic-periods/</loc>
		<lastmod>2025-08-09T03:21:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/future-proofing-your-software-supply-chain-with-sca-best-practices/</loc>
		<lastmod>2025-08-09T03:21:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-researchers-demonstrate-zero-click-prompt-injection-attacks-in-popular-ai-agents/</loc>
		<lastmod>2025-08-09T03:21:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-microsofts-real-time-war-against-cybersecurity-threats-2/</loc>
		<lastmod>2025-08-09T03:21:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-2025-what-keeps-cyber-experts-up-at-night/</loc>
		<lastmod>2025-08-09T03:22:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-nsa-chief-paul-nakasone-has-a-warning-for-the-tech-world/</loc>
		<lastmod>2025-08-09T03:22:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-new-york-times-cyber-reporter-issues-chilling-warning-at-black-hat-2/</loc>
		<lastmod>2025-08-09T03:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-adware-was-ist-das-und-wie-gefahrlich-ist-sie/</loc>
		<lastmod>2025-08-09T03:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prime-security-wins-black-hats-startup-spotlight-competition/</loc>
		<lastmod>2025-08-09T03:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sind-schulungen-im-zeitalter-von-ki-noch-sinnvoll/</loc>
		<lastmod>2025-08-09T04:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-einsatz-im-blindflug-unternehmen-bringen-sich-durch-fehlende-sicherheitsmasnahmen-in-gefahr/</loc>
		<lastmod>2025-08-09T04:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sind-schulungen-im-zeitalter-von-ki-noch-sinnvoll-2/</loc>
		<lastmod>2025-08-09T04:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-einsatz-im-blindflug-unternehmen-bringen-sich-durch-fehlende-sicherheitsmasnahmen-in-gefahr-2/</loc>
		<lastmod>2025-08-09T04:21:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-als-haupteinfallstor-2025/</loc>
		<lastmod>2025-08-09T04:21:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mastering-identity-modern-strategies-for-secure-access/</loc>
		<lastmod>2025-08-09T06:20:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberark-and-hashicorp-flaws-enable-remote-vault-takeover-without-credentials/</loc>
		<lastmod>2025-08-09T06:20:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/daten-abgegriffen-cyberangriff-trifft-air-france-klm-group/</loc>
		<lastmod>2025-08-09T06:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrarday-fur-phishing-angriffe-ausgenutzt/</loc>
		<lastmod>2025-08-09T07:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uber-28-000-ungepatchte-hybride-exchange-instanzen-cve-2025-53786-online/</loc>
		<lastmod>2025-08-09T08:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-attacks-exploit-winrar-flaw-cve-2025-8088-to-install-romcom/</loc>
		<lastmod>2025-08-09T08:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/castlebot-maas-released-diverse-payloads-in-coordinated-mass-ransomware-attacks/</loc>
		<lastmod>2025-08-09T08:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chromealone-a-browser-based-cobalt-strike-like-c2-tool-that-turns-chrome-into-a-hackers-playground/</loc>
		<lastmod>2025-08-09T08:20:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/karlsruher-staatstrojaner-urteil-bitkom-begrust-entscheidung-des-bundesverfassungsgerichts/</loc>
		<lastmod>2025-08-09T09:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-limits-police-spyware-use-to-serious-crimes/</loc>
		<lastmod>2025-08-09T09:20:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-werden-gezielter-trotz-ruckgang-der-fallzahlen/</loc>
		<lastmod>2025-08-09T10:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-weiterhin-fehlen-mehr-als-100-000-it-fachkrafte-in-deutschland/</loc>
		<lastmod>2025-08-09T10:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-28000-microsoft-exchange-servers-exposed-online-to-cve-2025-53786-vulnerability/</loc>
		<lastmod>2025-08-09T10:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-linux-kernel-vulnerability-allows-attackers-gain-full-kernel-level-control-from-chrome-sandbox/</loc>
		<lastmod>2025-08-09T10:20:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-chasing-ai-agents-build-a-persistent-autonomous-soc-instead/</loc>
		<lastmod>2025-08-09T11:20:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-court-records-system-has-been-hacked/</loc>
		<lastmod>2025-08-09T11:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-zero-day-exploits-discover-that-bypass-bitlocker-exposing-all-encrypted-data/</loc>
		<lastmod>2025-08-09T11:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-chasing-ai-agents-build-a-persistent-autonomous-soc-instead-2/</loc>
		<lastmod>2025-08-09T11:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-court-records-system-has-been-hacked-2/</loc>
		<lastmod>2025-08-09T11:21:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-zero-day-exploits-discover-that-bypass-bitlocker-exposing-all-encrypted-data-2/</loc>
		<lastmod>2025-08-09T11:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defcon-ai-cyber-challenge-winners-revealed-in-darpas-4m-cybersecurity-showdown/</loc>
		<lastmod>2025-08-09T11:21:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telekom-streaming-datenleck-bei-magenta-tv-betrifft-millionen-nutzer/</loc>
		<lastmod>2025-08-09T11:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/encryption-made-for-police-and-military-radios-may-be-easily-cracked-2/</loc>
		<lastmod>2025-08-09T12:20:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revault-when-your-soc-turns-against-you%c2%a6-deep-dive-edition/</loc>
		<lastmod>2025-08-09T13:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartphone-sicherheit-drei-unerlassliche-verhaltensregeln/</loc>
		<lastmod>2025-08-09T13:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/innenministerin-polizeidaten-nicht-in-die-hande-von-palantir/</loc>
		<lastmod>2025-08-09T13:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-code-review-strengthen-web-apps-security/</loc>
		<lastmod>2025-08-09T14:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-mythen-uber-ddos-angriffe-und-schutzmasnahmen/</loc>
		<lastmod>2025-08-09T14:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/untersuchung-der-bisherigen-ransomware-operationen-der-nicht-dokumentierten-gruppe-storm-2603/</loc>
		<lastmod>2025-08-09T14:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrar-zero-day-cve-2025-8088-exploited-to-spread-romcom-malware/</loc>
		<lastmod>2025-08-09T15:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-gpt-5-jailbreak-and-zero-click-ai-agent-attacks-exposing-cloud-and-iot-systems/</loc>
		<lastmod>2025-08-09T16:20:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigerian-man-extradited-from-france-to-us-over-hacking-and-fraud-allegations/</loc>
		<lastmod>2025-08-09T18:20:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tips-to-protect-yourself-on-linkedin-from-fraud-social-engineering-and-espionage/</loc>
		<lastmod>2025-08-09T19:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/embargo-ransomware-nets-34-2m-in-crypto-since-april-2024/</loc>
		<lastmod>2025-08-09T19:20:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-special-diamond-is-the-key-to-a-fully-open-source-quantum-sensor/</loc>
		<lastmod>2025-08-09T19:20:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-based-lenovo-webcams-flaw-can-be-remotely-exploited-for-badusb-attacks/</loc>
		<lastmod>2025-08-09T19:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/60-malicious-ruby-gems-downloaded-275000-times-steal-credentials/</loc>
		<lastmod>2025-08-09T20:20:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-confirms-data-breach-exposed-potential-google-ads-customers-info/</loc>
		<lastmod>2025-08-09T20:20:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omen-improvements/</loc>
		<lastmod>2025-08-10T03:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-be-optimistic-about-future-cybersecurity/</loc>
		<lastmod>2025-08-10T03:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maximizing-machine-identity-protection-efforts/</loc>
		<lastmod>2025-08-10T03:20:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-ais-bitter-lesson-for-socs-let-machines-be-machines/</loc>
		<lastmod>2025-08-10T03:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-536-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-08-10T03:20:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-sidewinder-mimics-government-and-military-agencies-to-steal-login-credentials/</loc>
		<lastmod>2025-08-10T07:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badcam-linux-based-lenovo-webcam-bugs-enable-badusb-attacks/</loc>
		<lastmod>2025-08-10T08:20:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-57/</loc>
		<lastmod>2025-08-10T08:20:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-laut-unit-42-haupteinfallstor-2025/</loc>
		<lastmod>2025-08-10T09:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-expanded-conference-in-linz-erneut-schaufenster-der-internationalen-digitalen-kunst-und-forschungsszene/</loc>
		<lastmod>2025-08-10T09:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-sonicwall-firewalls-targeted-in-ransomware-attacks-black-hat-usa-2025/</loc>
		<lastmod>2025-08-10T09:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-games-of-the-future-2025-abu-dhabi-rustet-spiele-der-zukunft-2025-mit-einer-reihe-phygital-disziplinen-aus/</loc>
		<lastmod>2025-08-10T10:19:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-reveal-revault-attack-targeting-dell-controlvault3-firmware-in-100-laptop-models/</loc>
		<lastmod>2025-08-10T10:19:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-dead-need-right-to-delete-their-data-so-they-cant-be-ai-ified-lawyer-says/</loc>
		<lastmod>2025-08-10T11:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentflayer-0-click-exploit-abuses-chatgpt-connectors-to-steal-3rd-party-app-data/</loc>
		<lastmod>2025-08-10T11:19:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-protect-yourself-from-portable-pointsale-scams/</loc>
		<lastmod>2025-08-10T11:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-researchers-unmasked-a-prolific-sms-scammer-a-new-operation-has-emerged-in-its-wake/</loc>
		<lastmod>2025-08-10T12:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sudden-spike-in-demand-causes-issues-in-azure-east-us-region/</loc>
		<lastmod>2025-08-10T12:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federated-identity-management-using-openid-connect/</loc>
		<lastmod>2025-08-10T13:19:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passkeys-recovery-and-management-strategies/</loc>
		<lastmod>2025-08-10T13:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-macos-malware-targets-user-login-credentials/</loc>
		<lastmod>2025-08-10T13:20:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-modell-von-openai-sicherheitslucken-in-gpt-5-aufgedeckt/</loc>
		<lastmod>2025-08-10T13:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2603-setzt-auf-multi-malware-strategie/</loc>
		<lastmod>2025-08-10T14:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-detail-windows-epm-poisoning-exploit-chain-leading-to-domain-privilege-escalation/</loc>
		<lastmod>2025-08-10T14:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-international-obfuscated-c-code-contest-is-back-for-2024/</loc>
		<lastmod>2025-08-10T15:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidessf-2025-confidential-computing-protecting-customer-data-in-the-cloud/</loc>
		<lastmod>2025-08-10T16:19:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/columbia-university-breach-affects-nearly-870000-people/</loc>
		<lastmod>2025-08-10T16:19:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/air-france-and-klm-confirm-customer-data-exposure-in-third-party-breach/</loc>
		<lastmod>2025-08-10T16:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bouygues-telecom-hit-by-cyberattack-6-4-million-customers-affected/</loc>
		<lastmod>2025-08-10T19:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-confirms-salesforce-crm-breach-faces-extortion-threat/</loc>
		<lastmod>2025-08-10T19:20:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: efc55140272db233743fbe5382e068c0; Queries for sitemap: 3; Total queries: 88; Seconds: 3.84; Memory for sitemap: 1KB; Total memory: 46MB -->
