<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='14. April 2026 23:34 pm' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/building-trust-in-cloud-environments-with-nhis/</loc>
		<lastmod>2025-11-10T06:33:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feel-assured-enhancing-pam-with-nhis-2/</loc>
		<lastmod>2025-11-10T06:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-trust-in-cloud-environments-with-nhis-2/</loc>
		<lastmod>2025-11-10T06:33:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/get-excited-new-innovations-in-nhis-for-cloud-security-3/</loc>
		<lastmod>2025-11-10T06:33:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-vulnerability-scoring-system-announced-to-address-gaps-in-cvss/</loc>
		<lastmod>2025-11-10T06:34:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sqlmap-open-source-sql-injection-and-database-takeover-tool/</loc>
		<lastmod>2025-11-10T06:34:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-vulnerability-scoring-system-announced-to-address-gaps-in-cvss-2/</loc>
		<lastmod>2025-11-10T06:35:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-adopt-ai-security-tools-without-losing-control/</loc>
		<lastmod>2025-11-10T06:35:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-vulnerability-scoring-system-announced-to-address-gaps-in-cvss-3/</loc>
		<lastmod>2025-11-10T06:35:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sqlmap-open-source-sql-injection-and-database-takeover-tool-2/</loc>
		<lastmod>2025-11-10T06:35:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-whisper-based-attack-reveals-user-prompts-hidden-inside-encrypted-ai-traffic/</loc>
		<lastmod>2025-11-10T06:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sqlmap-open-source-sql-injection-and-database-takeover-tool-3/</loc>
		<lastmod>2025-11-10T06:36:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-adopt-ai-security-tools-without-losing-control-2/</loc>
		<lastmod>2025-11-10T06:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-whisper-based-attack-reveals-user-prompts-hidden-inside-encrypted-ai-traffic-2/</loc>
		<lastmod>2025-11-10T06:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-adopt-ai-security-tools-without-losing-control-3/</loc>
		<lastmod>2025-11-10T06:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwortsicherheit-und-credential-stuffing-hibp-indexiert-13-milliarden-passworter-und-fast-2-milliarden-eadressen/</loc>
		<lastmod>2025-11-10T06:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/daten-schaffen-neue-transparenz-im-finanz-risikomanagement-wie-finanzinstitute-risiken-erkennen-und-datengetrieben-entscheiden/</loc>
		<lastmod>2025-11-10T07:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-runc-tool-to-escape-containers-and-compromise-hosts-3/</loc>
		<lastmod>2025-11-10T07:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-leak-exposes-chinese-state-sponsored-cyber-arsenal-and-target-database-3/</loc>
		<lastmod>2025-11-10T07:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenlecks-im-gesundheitswesen-warum-die-gefahr-trotz-sinkender-kosten-bleibt/</loc>
		<lastmod>2025-11-10T07:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wi-fi-signals-may-hold-the-key-to-touchless-access-control/</loc>
		<lastmod>2025-11-10T07:30:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adopting-a-counterintelligence-mindset-in-luxury-logistics/</loc>
		<lastmod>2025-11-10T07:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-intel-employee-hid-18000-sensitive-documents-prior-to-leaving-the-company/</loc>
		<lastmod>2025-11-10T07:32:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wi-fi-signals-may-hold-the-key-to-touchless-access-control-2/</loc>
		<lastmod>2025-11-10T07:32:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adopting-a-counterintelligence-mindset-in-luxury-logistics-2/</loc>
		<lastmod>2025-11-10T07:32:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langgraph-deserialization-flaw-enables-execution-of-malicious-python-code/</loc>
		<lastmod>2025-11-10T07:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-intel-employee-hid-18000-sensitive-documents-prior-to-leaving-the-company-2/</loc>
		<lastmod>2025-11-10T07:33:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elastic-defend-for-windows-vulnerability-allows-threat-actors-to-gain-elevated-access/</loc>
		<lastmod>2025-11-10T07:33:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wi-fi-signals-may-hold-the-key-to-touchless-access-control-3/</loc>
		<lastmod>2025-11-10T07:33:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langgraph-deserialization-flaw-enables-execution-of-malicious-python-code-2/</loc>
		<lastmod>2025-11-10T07:33:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adopting-a-counterintelligence-mindset-in-luxury-logistics-3/</loc>
		<lastmod>2025-11-10T07:33:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-runc-tool-to-escape-containers-and-compromise-hosts/</loc>
		<lastmod>2025-11-10T07:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-runc-tool-to-escape-containers-and-compromise-hosts-2/</loc>
		<lastmod>2025-11-10T07:35:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-leak-exposes-chinese-state-sponsored-cyber-arsenal-and-target-database/</loc>
		<lastmod>2025-11-10T07:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-leak-exposes-chinese-state-sponsored-cyber-arsenal-and-target-database-2/</loc>
		<lastmod>2025-11-10T07:35:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-must-prove-the-business-value-of-cyber-the-right-metrics-can-help/</loc>
		<lastmod>2025-11-10T08:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noid-privacy-macht-aus-windows-wieder-ein-betriebssystem/</loc>
		<lastmod>2025-11-10T08:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-must-prove-the-business-value-of-cyber-the-right-metrics-can-help-2/</loc>
		<lastmod>2025-11-10T08:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-adviser-becomes-latest-target-in-expanding-paragon-graphite-spyware-surveillance-case/</loc>
		<lastmod>2025-11-10T08:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-groups-target-construction-firms-to-steal-rdp-ssh-and-citrix-credentials/</loc>
		<lastmod>2025-11-10T08:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noid-privacy-macht-aus-windows-wieder-ein-betriebssystem-2/</loc>
		<lastmod>2025-11-10T08:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-must-prove-the-business-value-of-cyber-the-right-metrics-can-help-3/</loc>
		<lastmod>2025-11-10T08:33:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-adviser-becomes-latest-target-in-expanding-paragon-graphite-spyware-surveillance-case-2/</loc>
		<lastmod>2025-11-10T08:33:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eco-it-sicherheitsumfrage-2025-cyberresilienz-ist-chefsache/</loc>
		<lastmod>2025-11-10T08:33:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-groups-target-construction-firms-to-steal-rdp-ssh-and-citrix-credentials-2/</loc>
		<lastmod>2025-11-10T08:33:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infrastruktur-wie-rundfunk-auch-bei-blackouts-durchhalt/</loc>
		<lastmod>2025-11-10T08:34:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-you-should-purple-team-your-soc/</loc>
		<lastmod>2025-11-10T09:30:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-hosts-first-in-orbit-satellite-cybersecurity-competition/</loc>
		<lastmod>2025-11-10T09:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-you-should-purple-team-your-soc-2/</loc>
		<lastmod>2025-11-10T09:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-hosts-first-in-orbit-satellite-cybersecurity-competition-2/</loc>
		<lastmod>2025-11-10T09:32:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-websites-to-inject-malicious-links-for-seo-manipulation/</loc>
		<lastmod>2025-11-10T09:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-websites-to-inject-malicious-links-for-seo-manipulation-2/</loc>
		<lastmod>2025-11-10T09:32:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionage-samsung-nutzer-mit-bisher-unbekannter-spyware-attackiert/</loc>
		<lastmod>2025-11-10T09:32:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-demands-laser-security-focus-on-data-in-use/</loc>
		<lastmod>2025-11-10T10:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-professionalised-world-of-cybercrime-and-the-new-arms-race/</loc>
		<lastmod>2025-11-10T10:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-demands-laser-security-focus-on-data-in-use-2/</loc>
		<lastmod>2025-11-10T10:33:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-professionalised-world-of-cybercrime-and-the-new-arms-race-2/</loc>
		<lastmod>2025-11-10T10:33:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/250th-marine-corps-birthday-a-message-from-commandant-marine-corps-gen-eric-m-smith-and-sergeant-major-of-the-marine-corps-sgt-maj-carlos-a-ruiz/</loc>
		<lastmod>2025-11-10T10:33:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/250th-marine-corps-birthday-a-message-from-the-commandant-marine-corp-and-sergeant-major-of-the-marine-corps/</loc>
		<lastmod>2025-11-10T10:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/250th-marine-corps-birthday-a-message-from-commandant-marine-corps-gen-eric-m-smith-and-sergeant-major-of-the-marine-corps-sgt-maj-carlos-a-ruiz-2/</loc>
		<lastmod>2025-11-10T10:33:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/250th-marine-corps-birthday-a-message-from-commandant-marine-corps-gen-eric-m-smith-and-sergeant-major-of-the-marine-corps-sgt-maj-carlos-a-ruiz-3/</loc>
		<lastmod>2025-11-10T10:33:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/250th-marine-corps-birthday-a-message-from-the-commandant-marine-corp-and-sergeant-major-of-the-marine-corps-2/</loc>
		<lastmod>2025-11-10T10:33:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-neo-1x-the-robot-that-does-chores-and-spies-on-you/</loc>
		<lastmod>2025-11-10T10:34:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-ciam/</loc>
		<lastmod>2025-11-10T10:34:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-trick-chatgpt-into-prompt-injecting-itself/</loc>
		<lastmod>2025-11-10T10:34:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-neo-1x-the-robot-that-does-chores-and-spies-on-you-2/</loc>
		<lastmod>2025-11-10T10:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-ciam-2/</loc>
		<lastmod>2025-11-10T10:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hack-halts-dutch-broadcaster-forcing-radio-hosts-back-to-lps/</loc>
		<lastmod>2025-11-10T10:35:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-uk-joins-growing-list-of-clops-oracle-e-business-suite-victims/</loc>
		<lastmod>2025-11-10T10:35:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-neo-1x-the-robot-that-does-chores-and-spies-on-you-3/</loc>
		<lastmod>2025-11-10T10:36:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-to-decide-if-6-ghz-is-shared-between-wi-fi-and-cellular-networks/</loc>
		<lastmod>2025-11-10T10:38:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-to-decide-if-6-ghz-is-shared-between-wi-fi-and-cellular-networks-2/</loc>
		<lastmod>2025-11-10T10:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-one-way-to-cut-support-ticket-volume%c2%a6-send-them-to-another-company-entirely-2/</loc>
		<lastmod>2025-11-10T10:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-one-way-to-cut-support-ticket-volume%c2%a6-send-them-to-another-company-entirely/</loc>
		<lastmod>2025-11-10T10:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nine-nuget-packages-disrupt-dbs-and-industrial-systems-with-time-delayed-payloads/</loc>
		<lastmod>2025-11-10T10:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-operators-exploit-rmm-tools-to-deploy-medusa-and-dragonforce/</loc>
		<lastmod>2025-11-10T10:38:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nine-nuget-packages-disrupt-dbs-and-industrial-systems-with-time-delayed-payloads-2/</loc>
		<lastmod>2025-11-10T10:39:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-operators-exploit-rmm-tools-to-deploy-medusa-and-dragonforce-2/</loc>
		<lastmod>2025-11-10T10:39:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/large-scale-clickfix-phishing-attacks-target-hotel-systems-with-purerat-malware/</loc>
		<lastmod>2025-11-10T10:39:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-discovered-in-three-vs-code-extensions-with-thousands-of-installs/</loc>
		<lastmod>2025-11-10T10:40:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-set-to-retire-web-check-and-mail-check-tools/</loc>
		<lastmod>2025-11-10T10:41:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-discovered-in-three-vs-code-extensions-with-thousands-of-installs-2/</loc>
		<lastmod>2025-11-10T10:41:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-set-to-retire-web-check-and-mail-check-tools-2/</loc>
		<lastmod>2025-11-10T10:41:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-angriffsmethoden-bedrohen-microsoft-365-azure-umgebungen-wie-angreifer-ki-nutzen-um-microsoft-365-konten-zu-ubernehmen/</loc>
		<lastmod>2025-11-10T10:41:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-angriffsmethoden-bedrohen-microsoft-365-azure-umgebungen-wie-angreifer-ki-nutzen-um-microsoft-365-konten-zu-ubernehmen-2/</loc>
		<lastmod>2025-11-10T10:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-kundigung-gekundigter-intel-mitarbeiter-klaut-18-000-dateien/</loc>
		<lastmod>2025-11-10T10:42:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-discovered-in-three-vs-code-extensions-with-thousands-of-installs-3/</loc>
		<lastmod>2025-11-10T10:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-discovered-in-three-vs-code-extensions-with-thousands-of-installs-4/</loc>
		<lastmod>2025-11-10T10:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-discovered-in-three-vs-code-extensions-with-thousands-of-installs-5/</loc>
		<lastmod>2025-11-10T10:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-discovered-in-three-vs-code-extensions-with-thousands-of-installs-6/</loc>
		<lastmod>2025-11-10T10:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-it-der-stadt-ludwigshafen-fur-mehrere-tage-lahmgelegt/</loc>
		<lastmod>2025-11-10T10:43:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-kundigung-gekundigter-intel-mitarbeiter-klaut-18-000-dateien-2/</loc>
		<lastmod>2025-11-10T10:43:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-mosaic-effect-why-ai-is-breaking-enterprise-access-control/</loc>
		<lastmod>2025-11-10T11:30:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-customer-feedback-in-product-development/</loc>
		<lastmod>2025-11-10T11:31:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monsta-ftp-vulnerability-exposed-thousands-of-servers-to-full-takeover/</loc>
		<lastmod>2025-11-10T11:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-mosaic-effect-why-ai-is-breaking-enterprise-access-control-2/</loc>
		<lastmod>2025-11-10T11:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-customer-feedback-in-product-development-2/</loc>
		<lastmod>2025-11-10T11:32:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackgpt-launches-as-ai-driven-penetration-testing-suite-using-gpt-4-and-other-models/</loc>
		<lastmod>2025-11-10T11:32:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monsta-ftp-vulnerability-exposed-thousands-of-servers-to-full-takeover-2/</loc>
		<lastmod>2025-11-10T11:33:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-nca-campaign-warns-men-off-crypto-investment-scams/</loc>
		<lastmod>2025-11-10T11:33:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-mosaic-effect-why-ai-is-breaking-enterprise-access-control-3/</loc>
		<lastmod>2025-11-10T11:33:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackgpt-launches-as-ai-driven-penetration-testing-suite-using-gpt-4-and-other-models-2/</loc>
		<lastmod>2025-11-10T11:33:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-nca-campaign-warns-men-off-crypto-investment-scams-2/</loc>
		<lastmod>2025-11-10T11:33:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/migration-von-entra-connect-sync-zu-entra-cloud-sync-group-write-back-verwaltung-hybrider-identitaten/</loc>
		<lastmod>2025-11-10T11:34:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-veroffentlicht-den-threatlabz-2025-mobile-iot-and-ot-threat-report/</loc>
		<lastmod>2025-11-10T11:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/migration-von-entra-connect-sync-zu-entra-cloud-sync-group-write-back-verwaltung-hybrider-identitaten-2/</loc>
		<lastmod>2025-11-10T11:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/runtime-bugs-break-container-walls-enabling-root-on-docker-hosts/</loc>
		<lastmod>2025-11-10T12:31:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-information-sharing-law-would-get-extension-under-shutdown-deal-bill/</loc>
		<lastmod>2025-11-10T12:31:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-expiration-leaves-a-dangerous-void-in-us-cyber-collaboration/</loc>
		<lastmod>2025-11-10T12:32:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/runtime-bugs-break-container-walls-enabling-root-on-docker-hosts-2/</loc>
		<lastmod>2025-11-10T12:32:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-attacking-outlook-and-google-bypassing-traditional-email-defenses/</loc>
		<lastmod>2025-11-10T12:32:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-information-sharing-law-would-get-extension-under-shutdown-deal-bill-2/</loc>
		<lastmod>2025-11-10T12:33:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/runtime-bugs-break-container-walls-enabling-root-on-docker-hosts-3/</loc>
		<lastmod>2025-11-10T12:33:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-information-sharing-law-would-get-extension-under-shutdown-deal-bill-3/</loc>
		<lastmod>2025-11-10T12:33:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-expiration-leaves-a-dangerous-void-in-us-cyber-collaboration-2/</loc>
		<lastmod>2025-11-10T12:33:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucken-in-runc-angreifer-konnen-aus-docker-containern-ausbrechen/</loc>
		<lastmod>2025-11-10T12:33:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-moves-to-loosen-gdpr-for-ai-and-cookie-tracking/</loc>
		<lastmod>2025-11-10T13:30:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whisper-leak-uses-a-side-channel-attack-to-eavesdrop-on-encrypted-ai-conversations/</loc>
		<lastmod>2025-11-10T13:31:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-moves-to-loosen-gdpr-for-ai-and-cookie-tracking-2/</loc>
		<lastmod>2025-11-10T13:32:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-verbessert-bedrohungsanalyse-mit-einer-tieferen-integration-in-cloudtool-stratoshark/</loc>
		<lastmod>2025-11-10T13:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whisper-leak-uses-a-side-channel-attack-to-eavesdrop-on-encrypted-ai-conversations-2/</loc>
		<lastmod>2025-11-10T13:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-moves-to-loosen-gdpr-for-ai-and-cookie-tracking-3/</loc>
		<lastmod>2025-11-10T13:33:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bosartige-apps-im-google-play-store-infiltrieren-iot-und-ot-systeme/</loc>
		<lastmod>2025-11-10T13:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-verbessert-bedrohungsanalyse-mit-einer-tieferen-integration-in-cloudtool-stratoshark-2/</loc>
		<lastmod>2025-11-10T13:33:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whisper-leak-uses-a-side-channel-attack-to-eavesdrop-on-encrypted-ai-conversations-3/</loc>
		<lastmod>2025-11-10T13:33:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backup-informationen-direkt-im-security-operations-center/</loc>
		<lastmod>2025-11-10T13:34:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-moves-to-loosen-gdpr-for-ai-and-cookie-tracking-4/</loc>
		<lastmod>2025-11-10T13:34:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bosartige-apps-im-google-play-store-infiltrieren-iot-und-ot-systeme-2/</loc>
		<lastmod>2025-11-10T13:34:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-verbessert-bedrohungsanalyse-mit-einer-tieferen-integration-in-cloudtool-stratoshark-3/</loc>
		<lastmod>2025-11-10T13:34:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backup-informationen-direkt-im-security-operations-center-2/</loc>
		<lastmod>2025-11-10T13:34:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whisper-leak-uses-a-side-channel-attack-to-eavesdrop-on-encrypted-ai-conversations-4/</loc>
		<lastmod>2025-11-10T13:34:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/louvre-museums-camera-network-password-was-reportedly-just-louvre/</loc>
		<lastmod>2025-11-10T13:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-in-cybersecurity-beyond-triage-to-strategic-threat-hunting/</loc>
		<lastmod>2025-11-10T13:35:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/louvre-museums-camera-network-password-was-reportedly-just-louvre-2/</loc>
		<lastmod>2025-11-10T13:36:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nuget-supply-chain-exploit-uses-timed-destructive-payloads-against-ics/</loc>
		<lastmod>2025-11-10T13:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-in-cybersecurity-beyond-triage-to-strategic-threat-hunting-2/</loc>
		<lastmod>2025-11-10T13:37:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mad-cat-meow-tool-sparks-real-world-data-corruption-attacks/</loc>
		<lastmod>2025-11-10T13:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nuget-supply-chain-exploit-uses-timed-destructive-payloads-against-ics-2/</loc>
		<lastmod>2025-11-10T13:37:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-npm-library-used-in-ai-and-nlp-projects-exposes-systems-to-rce/</loc>
		<lastmod>2025-11-10T13:38:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/louvre-museums-camera-network-password-was-reportedly-just-louvre-3/</loc>
		<lastmod>2025-11-10T13:38:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mad-cat-meow-tool-sparks-real-world-data-corruption-attacks-2/</loc>
		<lastmod>2025-11-10T13:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-in-cybersecurity-beyond-triage-to-strategic-threat-hunting-3/</loc>
		<lastmod>2025-11-10T13:38:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-hyper-v-malware-malicious-ai-bots-rdp-exploits-whatsapp-lockdown-and-more/</loc>
		<lastmod>2025-11-10T13:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-hyper-v-malware-malicious-ai-bots-rdp-exploits-whatsapp-lockdown-and-more-2/</loc>
		<lastmod>2025-11-10T13:40:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-browser-security-report-reveals-emerging-threats-for-enterprises/</loc>
		<lastmod>2025-11-10T13:40:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-browser-security-report-reveals-emerging-threats-for-enterprises-2/</loc>
		<lastmod>2025-11-10T13:41:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-hyper-v-malware-malicious-ai-bots-rdp-exploits-whatsapp-lockdown-and-more-3/</loc>
		<lastmod>2025-11-10T13:41:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-security-malware-direkt-aus-der-handyfabrik/</loc>
		<lastmod>2025-11-10T13:41:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-security-malware-direkt-aus-der-handyfabrik-2/</loc>
		<lastmod>2025-11-10T13:41:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/generative-ai-the-double-edged-sword-of-cybersecurity/</loc>
		<lastmod>2025-11-10T14:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-lot-of-people-are-getting-hacked-with-government-spyware/</loc>
		<lastmod>2025-11-10T14:31:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/generative-ai-the-double-edged-sword-of-cybersecurity-2/</loc>
		<lastmod>2025-11-10T14:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-lot-of-people-are-getting-hacked-with-government-spyware-2/</loc>
		<lastmod>2025-11-10T14:32:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incident-response-team-shieldforce-partners-with-accuknox-for-zero-trust-cnapp-in-latin-america/</loc>
		<lastmod>2025-11-10T14:32:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incident-response-team-shieldforce-partners-with-accuknox-for-zero-trust-cnapp-in-latin-america-2/</loc>
		<lastmod>2025-11-10T14:32:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/download-strengthening-identity-security-whitepaper/</loc>
		<lastmod>2025-11-10T14:32:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/download-strengthening-identity-security-whitepaper-2/</loc>
		<lastmod>2025-11-10T14:32:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staying-safe-after-a-cyber-attack/</loc>
		<lastmod>2025-11-10T14:32:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staying-safe-after-a-cyber-attack-2/</loc>
		<lastmod>2025-11-10T14:32:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-users-hit-by-malware-disguised-as-relaxation-programs/</loc>
		<lastmod>2025-11-10T14:33:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-zeigt-ki-scheitert-klaglich-bei-der-malware-entwicklung/</loc>
		<lastmod>2025-11-10T14:33:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-users-hit-by-malware-disguised-as-relaxation-programs-2/</loc>
		<lastmod>2025-11-10T14:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chef-schreibt-dir-auf-teams-konnte-ein-hacker-sein-so-tricksten-angreifer-unternehmen-aus/</loc>
		<lastmod>2025-11-10T14:34:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-auf-der-apple-watch-so-funktioniert-der-messenger-jetzt-am-handgelenk/</loc>
		<lastmod>2025-11-10T14:34:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-geopolitical-uncertainty-rising-is-it-time-to-reimagine-your-gcc-nearshore-strategy/</loc>
		<lastmod>2025-11-10T15:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-codierte-ransomware-auf-microsoft-marketplace-entdeckt/</loc>
		<lastmod>2025-11-10T15:30:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-missile-barrage-disrupts-internet-customs-databases-in-ukraine/</loc>
		<lastmod>2025-11-10T15:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-geopolitical-uncertainty-rising-is-it-time-to-reimagine-your-gcc-nearshore-strategy-2/</loc>
		<lastmod>2025-11-10T15:32:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-codierte-ransomware-auf-microsoft-marketplace-entdeckt-2/</loc>
		<lastmod>2025-11-10T15:32:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/short-term-renewal-of-cyber-information-sharing-law-appears-in-bill-to-end-shutdown/</loc>
		<lastmod>2025-11-10T15:32:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-missile-barrage-disrupts-internet-customs-databases-in-ukraine-2/</loc>
		<lastmod>2025-11-10T15:32:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-geopolitical-uncertainty-rising-is-it-time-to-reimagine-your-gcc-nearshore-strategy-3/</loc>
		<lastmod>2025-11-10T15:33:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-broker-pleads-guilty-to-profiting-from-yanluowang-ransomware-attacks/</loc>
		<lastmod>2025-11-10T15:33:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-codierte-ransomware-auf-microsoft-marketplace-entdeckt-3/</loc>
		<lastmod>2025-11-10T15:33:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-missile-barrage-disrupts-internet-customs-databases-in-ukraine-3/</loc>
		<lastmod>2025-11-10T15:33:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/short-term-renewal-of-cyber-information-sharing-law-appears-in-bill-to-end-shutdown-2/</loc>
		<lastmod>2025-11-10T15:33:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-reasons-why-attackers-are-phishing-over-linkedin/</loc>
		<lastmod>2025-11-10T15:34:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incident-response-team-shieldforce-partners-with-accuknox-for-zero-trust-cnapp-in-latin-america-3/</loc>
		<lastmod>2025-11-10T15:34:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-reasons-why-attackers-are-phishing-over-linkedin-2/</loc>
		<lastmod>2025-11-10T15:35:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vertrauen-in-cybersicherheit-sinkt-weiter-kaum-eigenschutz-aber-hohe-erwartungen-an-unternehmen/</loc>
		<lastmod>2025-11-10T15:35:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-stellt-neue-features-in-falco-vor/</loc>
		<lastmod>2025-11-10T15:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-erweitert-die-unterstutzung-fur-microsoft-sentinel/</loc>
		<lastmod>2025-11-10T15:35:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionagesoftware-neuer-vorsitzender-der-nso-group-ist-trump-vertrauter/</loc>
		<lastmod>2025-11-10T15:36:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-attacks-against-secure-enclaves/</loc>
		<lastmod>2025-11-10T16:30:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-less-crypto-investment-scams-a-california-case/</loc>
		<lastmod>2025-11-10T16:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-attacks-against-secure-enclaves-2/</loc>
		<lastmod>2025-11-10T16:32:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-less-crypto-investment-scams-a-california-case-2/</loc>
		<lastmod>2025-11-10T16:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-worsen-its-capacity-crunch-sp-global/</loc>
		<lastmod>2025-11-10T16:33:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-detects-new-attack-variant-targeting-vulnerable-firewalls/</loc>
		<lastmod>2025-11-10T16:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-worsen-its-capacity-crunch-sp-global-2/</loc>
		<lastmod>2025-11-10T16:33:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-warns-of-further-financial-fallout-from-cyberattack/</loc>
		<lastmod>2025-11-10T16:33:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-attacks-against-secure-enclaves-3/</loc>
		<lastmod>2025-11-10T16:33:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-detects-new-attack-variant-targeting-vulnerable-firewalls-2/</loc>
		<lastmod>2025-11-10T16:33:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-warns-of-further-financial-fallout-from-cyberattack-2/</loc>
		<lastmod>2025-11-10T16:34:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stadtverwaltung-ludwigshafen-kampft-mit-it-ausfall/</loc>
		<lastmod>2025-11-10T16:34:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/denmark-and-norway-investigate-yutong-bus-security-flaw-amid-rising-tech-fears/</loc>
		<lastmod>2025-11-10T16:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stadtverwaltung-ludwigshafen-kampft-mit-it-ausfall-2/</loc>
		<lastmod>2025-11-10T16:35:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/denmark-and-norway-investigate-yutong-bus-security-flaw-amid-rising-tech-fears-2/</loc>
		<lastmod>2025-11-10T16:35:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-targets-hotels-spurs-secondary-customer-attacks/</loc>
		<lastmod>2025-11-10T16:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/landfall-advanced-commercial-grade-spyware-targeting-samsung-devices/</loc>
		<lastmod>2025-11-10T16:36:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/landfall-malware-targets-samsung-galaxy-users/</loc>
		<lastmod>2025-11-10T16:36:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-targets-hotels-spurs-secondary-customer-attacks-2/</loc>
		<lastmod>2025-11-10T16:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-aligned-uta0388-uses-ai-tools-in-global-phishing-campaigns/</loc>
		<lastmod>2025-11-10T16:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-als-strategie-update-internationaler-strafgerichtshof-setzt-auf-open-source-statt-auf-microsoft/</loc>
		<lastmod>2025-11-10T16:37:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-for-technical-professionals-a-comprehensive-guide-to-understanding-and-implementing-the-model-context-protocol/</loc>
		<lastmod>2025-11-10T17:30:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hypr-and-yubico-deepen-partnership-to-secure-and-scale-passkey-deployment-through-automated-identity-verification/</loc>
		<lastmod>2025-11-10T17:31:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spacex-and-musk-called-on-to-rescue-chinas-shenzhou-20-crew/</loc>
		<lastmod>2025-11-10T17:31:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-for-technical-professionals-a-comprehensive-guide-to-understanding-and-implementing-the-model-context-protocol-2/</loc>
		<lastmod>2025-11-10T17:31:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/landfall-spyware-targeted-samsung-galaxy-phones-via-malicious-images/</loc>
		<lastmod>2025-11-10T17:32:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-organizations-cant-ignore-vendor-risk-assessment-in-todays-cyber-threat-landscape/</loc>
		<lastmod>2025-11-10T17:32:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hypr-and-yubico-deepen-partnership-to-secure-and-scale-passkey-deployment-through-automated-identity-verification-2/</loc>
		<lastmod>2025-11-10T17:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/65-of-leading-ai-companies-found-with-verified-secrets-leaks/</loc>
		<lastmod>2025-11-10T17:33:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kryptowahrung-nachfrage-nach-hardware-wallets-steigt-deutlich/</loc>
		<lastmod>2025-11-10T17:33:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-trump-official-named-nso-group-executive-chairman/</loc>
		<lastmod>2025-11-10T18:29:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intel-sues-ex-engineer-for-stealing-18000-top-secret-files/</loc>
		<lastmod>2025-11-10T18:30:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-federal-cybersecurity-funding-set-to-resume-as-government-shutdown-draws-to-a-close-for-now/</loc>
		<lastmod>2025-11-10T19:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishers-try-to-lure-5k-facebook-advertisers-with-fake-business-pages/</loc>
		<lastmod>2025-11-10T19:31:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-ai-enables-bad-actors-how-are-3000-teams-responding/</loc>
		<lastmod>2025-11-10T19:31:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/</loc>
		<lastmod>2025-11-10T19:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-federal-cybersecurity-funding-set-to-resume-as-government-shutdown-draws-to-a-close-for-now-2/</loc>
		<lastmod>2025-11-10T19:31:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adaptability-ease-whats-new-in-datadomes-q3-2025-platform-updates/</loc>
		<lastmod>2025-11-10T20:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-whistleblowers-would-get-expanded-protections-under-california-proposal/</loc>
		<lastmod>2025-11-10T20:31:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/18000-files-stolen-intel-faces-insider-threat-challenge/</loc>
		<lastmod>2025-11-10T20:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adaptability-ease-whats-new-in-datadomes-q3-2025-platform-updates-2/</loc>
		<lastmod>2025-11-10T20:31:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks/</loc>
		<lastmod>2025-11-10T20:32:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-whistleblowers-would-get-expanded-protections-under-california-proposal-2/</loc>
		<lastmod>2025-11-10T20:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/18000-files-stolen-intel-faces-insider-threat-challenge-2/</loc>
		<lastmod>2025-11-10T20:32:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yanluowang-initial-access-broker-to-plead-guilty-to-ransomware-attacks/</loc>
		<lastmod>2025-11-10T20:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks-2/</loc>
		<lastmod>2025-11-10T20:32:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enforcement-begins-for-new-yorks-algorithmic-pricing-law/</loc>
		<lastmod>2025-11-10T21:30:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-has-resurfaced-on-the-open-vsx-registry/</loc>
		<lastmod>2025-11-10T21:31:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yanluowang-initial-access-broker-pleaded-guilty-to-ransomware-attacks/</loc>
		<lastmod>2025-11-10T21:31:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-left-to-worry-and-not-worry-about-in-the-f5-breach-aftermath/</loc>
		<lastmod>2025-11-10T22:30:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wi-fi-beamforming-tech-can-identify-individuals-by-gait/</loc>
		<lastmod>2025-11-10T22:31:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/states-fine-firm-5-1m-in-hack-affecting-3-million-students/</loc>
		<lastmod>2025-11-10T22:31:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwordless-future-smart-verification-for-fraud-prevention/</loc>
		<lastmod>2025-11-10T22:31:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-compliance-boxes-to-fraud-prevention-grc-reimagined/</loc>
		<lastmod>2025-11-10T22:31:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-cyber-espionage-proofpoint-uncovers-unk_smudgedserpent/</loc>
		<lastmod>2025-11-10T22:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-route-redirect-phaas-targets-microsoft-365-users-worldwide/</loc>
		<lastmod>2025-11-10T22:32:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploiting-triofox-flaw-to-install-remote-access-tools-via-antivirus-feature/</loc>
		<lastmod>2025-11-10T22:32:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konni-hackers-turn-googles-find-hub-into-a-remote-data-wiping-weapon/</loc>
		<lastmod>2025-11-10T22:32:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-safe-are-your-nhis-in-hybrid-cloud-environments/</loc>
		<lastmod>2025-11-10T23:30:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empower-your-security-team-with-efficient-nhi-management/</loc>
		<lastmod>2025-11-10T23:31:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-trust-in-nhis-is-essential-for-business-security/</loc>
		<lastmod>2025-11-10T23:31:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-your-nhis-withstand-a-cyber-attack/</loc>
		<lastmod>2025-11-10T23:31:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-is-a-leader-in-the-first-ever-gartner-magic-quadrant-for-exposure-assessment-platforms/</loc>
		<lastmod>2025-11-10T23:31:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-safe-are-your-nhis-in-hybrid-cloud-environments-2/</loc>
		<lastmod>2025-11-10T23:32:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empower-your-security-team-with-efficient-nhi-management-2/</loc>
		<lastmod>2025-11-10T23:32:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacker-to-plead-guilty-to-aiding-yanluowang-ransomware-group/</loc>
		<lastmod>2025-11-10T23:32:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cmmc-new-cyber-rules-hit-defense-supply-chain/</loc>
		<lastmod>2025-11-10T23:33:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-firefox-gets-new-anti-fingerprinting-defenses/</loc>
		<lastmod>2025-11-10T23:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-highlights-supply-chain-risks-in-new-top-10/</loc>
		<lastmod>2025-11-10T23:33:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacker-to-plead-guilty-to-aiding-yanluowang-ransomware-group-2/</loc>
		<lastmod>2025-11-10T23:34:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-returns-slices-back-into-vs-code-extensions/</loc>
		<lastmod>2025-11-10T23:34:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/effektive-absicherung-der-ki-systeme-tuv-rheinland-publiziert-whitepaper/</loc>
		<lastmod>2025-11-11T00:29:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm-side-channel-attack-could-allow-snoops-to-guess-what-youre-talking-about/</loc>
		<lastmod>2025-11-11T00:30:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-2025-released-whats-new-in-web-app-security/</loc>
		<lastmod>2025-11-11T00:30:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faster-than-real-time-why-your-security-fails-and-what-to-do-next/</loc>
		<lastmod>2025-11-11T04:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secureiqlab-brings-independent-outcome-based-validation-to-mplify-at-global-naas-event-gne/</loc>
		<lastmod>2025-11-11T04:31:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faster-than-real-time-why-your-security-fails-and-what-to-do-next-2/</loc>
		<lastmod>2025-11-11T04:31:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-glassworm-wormed-its-way-back-into-developers-code-and-what-it-says-about-open-source-security/</loc>
		<lastmod>2025-11-11T04:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-konni-apt-hijacks-google-find-hub-to-remotely-wipe-and-track-south-korean-android-devices/</loc>
		<lastmod>2025-11-11T04:32:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secureiqlab-brings-independent-outcome-based-validation-to-mplify-at-global-naas-event-gne-2/</loc>
		<lastmod>2025-11-11T04:32:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-group-attacks-aerospace-defense-with-new-chacha20-encrypted-comebacker-backdoor/</loc>
		<lastmod>2025-11-11T04:32:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-glassworm-wormed-its-way-back-into-developers-code-and-what-it-says-about-open-source-security-2/</loc>
		<lastmod>2025-11-11T04:32:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-kritische-sicherheitslucken-als-wegbereiter-fur-datendiebstahl-und-hijacking/</loc>
		<lastmod>2025-11-11T04:33:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-sicherheitsteams-zur-zunahme-von-php-und-iot-exploits-wissen-sollten/</loc>
		<lastmod>2025-11-11T04:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-kritische-sicherheitslucken-als-wegbereiter-fur-datendiebstahl-und-hijacking-2/</loc>
		<lastmod>2025-11-11T04:34:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-get-distracted-by-ai-focus-on-real-cyber-threats/</loc>
		<lastmod>2025-11-11T04:34:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-sicherheitsteams-zur-zunahme-von-php-und-iot-exploits-wissen-sollten-2/</loc>
		<lastmod>2025-11-11T04:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-get-distracted-by-ai-focus-on-real-cyber-threats-2/</loc>
		<lastmod>2025-11-11T04:34:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/</loc>
		<lastmod>2025-11-11T04:34:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-kritische-sicherheitslucken-als-wegbereiter-fur-datendiebstahl-und-hijacking-3/</loc>
		<lastmod>2025-11-11T04:35:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks-2/</loc>
		<lastmod>2025-11-11T04:35:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-highlights-supply-chain-risks-in-new-top-10-list/</loc>
		<lastmod>2025-11-11T04:35:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-sicherheitsteams-zur-zunahme-von-php-und-iot-exploits-wissen-sollten-3/</loc>
		<lastmod>2025-11-11T04:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-get-distracted-by-ai-focus-on-real-cyber-threats-3/</loc>
		<lastmod>2025-11-11T04:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-highlights-supply-chain-risks-in-new-top-10-list-2/</loc>
		<lastmod>2025-11-11T04:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verantwortungsvoller-ki-einsatz-code-of-conduct-demokratische-ki-governance-und-abwagung-gefordert/</loc>
		<lastmod>2025-11-11T05:29:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/techtalk-strategische-partnerschaft-von-delinea-und-telekom-security-lasst-kunden-profitieren/</loc>
		<lastmod>2025-11-11T06:30:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-are-cracking-under-pressure/</loc>
		<lastmod>2025-11-11T06:31:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-triofox-0-day-to-deploy-malicious-payloads-using-anti-virus-feature/</loc>
		<lastmod>2025-11-11T06:31:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hidden-risks-in-the-financial-sectors-supply-chain/</loc>
		<lastmod>2025-11-11T06:31:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-report-xhunt-targets-microsoft-exchange-and-iis-with-custom-backdoors/</loc>
		<lastmod>2025-11-11T06:31:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/techtalk-strategische-partnerschaft-von-delinea-und-telekom-security-lasst-kunden-profitieren-2/</loc>
		<lastmod>2025-11-11T06:32:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-2025-released-major-revisions-and-two-new-security-classes-added/</loc>
		<lastmod>2025-11-11T06:33:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-asa-und-ftd-akut-gefahrdet-angreifer-provozieren-neustarts-ungepatchter-cisco-firewalls/</loc>
		<lastmod>2025-11-11T06:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/masnahmen-zur-gewahrleistung-der-itsicherheit-in-kommunen/</loc>
		<lastmod>2025-11-11T07:30:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asahi-cyberattack-brings-japans-top-brewer-to-its-knees-during-peak-beer-season/</loc>
		<lastmod>2025-11-11T07:31:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/who-owns-the-cybersecurity-of-space/</loc>
		<lastmod>2025-11-11T07:31:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/to-get-funding-cisos-are-mastering-the-language-of-money/</loc>
		<lastmod>2025-11-11T07:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/masnahmen-zur-gewahrleistung-der-itsicherheit-in-kommunen-2/</loc>
		<lastmod>2025-11-11T07:32:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asahi-cyberattack-brings-japans-top-brewer-to-its-knees-during-peak-beer-season-2/</loc>
		<lastmod>2025-11-11T07:32:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/who-owns-the-cybersecurity-of-space-2/</loc>
		<lastmod>2025-11-11T07:32:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/to-get-funding-cisos-are-mastering-the-language-of-money-2/</loc>
		<lastmod>2025-11-11T07:32:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-samsung-0-day-rce-flaw-actively-exploited-in-attacks/</loc>
		<lastmod>2025-11-11T07:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-samsung-0-day-rce-flaw-actively-exploited-in-attacks-2/</loc>
		<lastmod>2025-11-11T07:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/danabot-malware-reemerges-with-version-669-after-operation-endgame/</loc>
		<lastmod>2025-11-11T07:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-far-can-police-push-privacy-before-it-breaks/</loc>
		<lastmod>2025-11-11T07:33:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-group-deploys-weaponized-documents-against-aerospace-defense/</loc>
		<lastmod>2025-11-11T07:33:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-passwordless-future-may-never-fully-arrive/</loc>
		<lastmod>2025-11-11T08:30:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-critical-runc-bugs-allowing-full-container-escape/</loc>
		<lastmod>2025-11-11T08:31:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-expose-deep-connections-between-maverick-and-coyote-banking-malware/</loc>
		<lastmod>2025-11-11T08:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/65-of-top-ai-firms-found-exposing-verified-api-keys-and-tokens-on-github/</loc>
		<lastmod>2025-11-11T08:31:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-of-security-alert-themed-malicious-emails-that-steal-your-email-logins/</loc>
		<lastmod>2025-11-11T08:31:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-passwordless-future-may-never-fully-arrive-2/</loc>
		<lastmod>2025-11-11T08:32:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-critical-runc-bugs-allowing-full-container-escape-2/</loc>
		<lastmod>2025-11-11T08:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stadtverwaltung-ludwigshafen-anzeichen-fur-cyberangriff-verdichten-sich/</loc>
		<lastmod>2025-11-11T08:33:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-verandert-die-sicherheitsarchitektur-grundlegend-ki-als-prufstein-fur-die-it-sicherheit-der-zukunft/</loc>
		<lastmod>2025-11-11T08:33:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stadtverwaltung-ludwigshafen-anzeichen-fur-cyberangriff-verdichten-sich-2/</loc>
		<lastmod>2025-11-11T08:34:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-verandert-die-sicherheitsarchitektur-grundlegend-ki-als-prufstein-fur-die-it-sicherheit-der-zukunft-2/</loc>
		<lastmod>2025-11-11T08:34:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsbasierte-angriffe-sind-weiterhin-auf-dem-vormarsch/</loc>
		<lastmod>2025-11-11T08:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsbasierte-angriffe-sind-weiterhin-auf-dem-vormarsch-2/</loc>
		<lastmod>2025-11-11T08:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fernzugriff-aus-china-briten-untersuchen-ihre-elektrobusse-auf-kill-switch/</loc>
		<lastmod>2025-11-11T08:34:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stadtverwaltung-ludwigshafen-anzeichen-fur-cyberangriff-verdichten-sich-3/</loc>
		<lastmod>2025-11-11T08:35:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fernzugriff-aus-china-briten-untersuchen-ihre-elektrobusse-auf-kill-switch-2/</loc>
		<lastmod>2025-11-11T08:35:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration/</loc>
		<lastmod>2025-11-11T09:29:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-security-automation-using-ai-to-strengthen-defenses-and-response/</loc>
		<lastmod>2025-11-11T10:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-rewriting-fraud-rules/</loc>
		<lastmod>2025-11-11T10:31:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-samsung-mobile-devices-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-11-11T10:31:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-healthcare-aims-to-replace-faxes-and-phones-with-secure-messaging/</loc>
		<lastmod>2025-11-11T10:31:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uks-ajax-fighting-vehicle-arrives-years-late-and-still-sending-crew-to-hospital/</loc>
		<lastmod>2025-11-11T10:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-quantum-route-redirect-to-launch-instant-phishing-on-m365/</loc>
		<lastmod>2025-11-11T10:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devolutions-server-flaw-allows-attackers-to-impersonate-users-via-pre-mfa-cookie/</loc>
		<lastmod>2025-11-11T10:32:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-vanhelsing-ransomware-as-a-service-hits-windows-linux-bsd-arm-and-esxi/</loc>
		<lastmod>2025-11-11T10:33:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-quantum-route-redirect-to-launch-instant-phishing-on-m365-2/</loc>
		<lastmod>2025-11-11T10:33:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devolutions-server-flaw-allows-attackers-to-impersonate-users-via-pre-mfa-cookie-2/</loc>
		<lastmod>2025-11-11T10:33:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-route-redirect-phishing-kit-democratizes-cyber-attacks/</loc>
		<lastmod>2025-11-11T10:33:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-vanhelsing-ransomware-as-a-service-hits-windows-linux-bsd-arm-and-esxi-2/</loc>
		<lastmod>2025-11-11T10:34:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-firebox-flaw-allows-attackers-to-gain-unauthorized-ssh-access/</loc>
		<lastmod>2025-11-11T10:34:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaks-auf-github-top-ki-unternehmen-haben-ihre-keys-nicht-im-griff/</loc>
		<lastmod>2025-11-11T10:35:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-maturity-and-why-your-api-security-is-lagging-behind-firetail-blog/</loc>
		<lastmod>2025-11-11T11:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/idor-attacks-and-the-growing-threat-to-your-api-security-firetail-blog/</loc>
		<lastmod>2025-11-11T11:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evaluating-the-attack-surface-of-ai-chatbots-deployed-in-enterprise-settings/</loc>
		<lastmod>2025-11-11T11:32:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/united-states-of-america-veterans-day-november-11-2025-honoring-all-who-served/</loc>
		<lastmod>2025-11-11T11:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/encryption-encoding-and-hashing-explained/</loc>
		<lastmod>2025-11-11T11:33:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-startups-leak-sensitive-credentials-on-github-exposing-models-and-training-data/</loc>
		<lastmod>2025-11-11T11:33:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/idor-attacks-and-the-growing-threat-to-your-api-security-firetail-blog-2/</loc>
		<lastmod>2025-11-11T11:33:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-in-the-world-of-chatgpt-risks-importance-best-practices/</loc>
		<lastmod>2025-11-11T11:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-silos-how-ddi-ai-integration-is-redefining-cyber-resilience/</loc>
		<lastmod>2025-11-11T11:35:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-insurers-paid-out-over-twice-as-much-for-uk-ransomware-attacks-last-year/</loc>
		<lastmod>2025-11-11T11:36:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-in-the-world-of-chatgpt-risks-importance-best-practices-2/</loc>
		<lastmod>2025-11-11T11:36:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-silos-how-ddi-ai-integration-is-redefining-cyber-resilience-2/</loc>
		<lastmod>2025-11-11T11:36:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offentliche-verwaltung-im-visier-von-cyberspionen/</loc>
		<lastmod>2025-11-11T11:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-zero-day-bug-used-in-spyware-attacks-to-kev/</loc>
		<lastmod>2025-11-11T11:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-finds-open-weight-ai-models-easy-to-exploit-in-long-chats/</loc>
		<lastmod>2025-11-11T11:37:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proxy-und-reverse-proxy-server-in-dsm-mehr-sicherheit-und-kontrolle-durch-proxy-server-im-synology-nas/</loc>
		<lastmod>2025-11-11T11:38:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackedgpt-tenable-deckt-sicherheitslucken-in-chatgpt-auf/</loc>
		<lastmod>2025-11-11T11:38:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-finds-open-weight-ai-models-easy-to-exploit-in-long-chats-2/</loc>
		<lastmod>2025-11-11T11:39:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proxy-und-reverse-proxy-server-in-dsm-mehr-sicherheit-und-kontrolle-durch-proxy-server-im-synology-nas-2/</loc>
		<lastmod>2025-11-11T11:39:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackedgpt-tenable-deckt-sicherheitslucken-in-chatgpt-auf-2/</loc>
		<lastmod>2025-11-11T11:39:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/application-attack-patterns-attack-graphs-reveal-81-threats-your-tools-miss/</loc>
		<lastmod>2025-11-11T12:31:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-moves-to-restore-lapsed-cybersecurity-laws-after-shutdown/</loc>
		<lastmod>2025-11-11T12:32:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/durchgesickerter-entwurf-zeigt-die-eu-will-den-datenschutz-schleifen-und-ki-vorfahrt-geben/</loc>
		<lastmod>2025-11-11T12:32:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/application-attack-patterns-attack-graphs-reveal-81-threats-your-tools-miss-2/</loc>
		<lastmod>2025-11-11T12:33:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-asks-cyberspies-to-probe-whether-chinese-buses-can-be-switched-off-remotely/</loc>
		<lastmod>2025-11-11T12:33:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-npm-package-with-206k-downloads-targeted-github-for-credentials/</loc>
		<lastmod>2025-11-11T12:33:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-moves-to-restore-lapsed-cybersecurity-laws-after-shutdown-2/</loc>
		<lastmod>2025-11-11T12:33:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/application-attack-patterns-attack-graphs-reveal-81-threats-your-tools-miss-3/</loc>
		<lastmod>2025-11-11T12:34:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-latest-security-push-marks-the-slow-death-of-passwords/</loc>
		<lastmod>2025-11-11T12:35:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-campaign-targets-meta-business-suite-users/</loc>
		<lastmod>2025-11-11T12:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-latest-security-push-marks-the-slow-death-of-passwords-2/</loc>
		<lastmod>2025-11-11T12:36:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ferocious-kitten-apt-uses-markirat-for-keystroke-and-clipboard-surveillance/</loc>
		<lastmod>2025-11-11T12:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-expert-guide-to-ai-supply-chain-attacks/</loc>
		<lastmod>2025-11-11T12:36:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-campaign-targets-meta-business-suite-users-2/</loc>
		<lastmod>2025-11-11T12:36:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-detect-malicious-npm-package-targeting-github-owned-repositories/</loc>
		<lastmod>2025-11-11T12:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ferocious-kitten-apt-uses-markirat-for-keystroke-and-clipboard-surveillance-2/</loc>
		<lastmod>2025-11-11T12:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-latest-security-push-marks-the-slow-death-of-passwords-3/</loc>
		<lastmod>2025-11-11T12:38:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-trojan-fantasy-hub-malware-service-turns-telegram-into-a-hub-for-hackers/</loc>
		<lastmod>2025-11-11T12:38:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-sicherheit-durch-microsoft-local-administrator-password-solution-konten/</loc>
		<lastmod>2025-11-11T12:39:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-microsoft-365-neues-phishing-kit-macht-datenklau-leichter-denn-je/</loc>
		<lastmod>2025-11-11T12:39:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-trojan-fantasy-hub-malware-service-turns-telegram-into-a-hub-for-hackers-2/</loc>
		<lastmod>2025-11-11T12:39:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyfirma-firetail-working-together-for-complete-visibility-and-robust-api-security-firetail-blog/</loc>
		<lastmod>2025-11-11T13:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-security-bridging-the-gap-between-application-and-security-teams-firetail-blog/</loc>
		<lastmod>2025-11-11T13:32:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetail-names-timo-ruppell-as-vice-president-of-product-firetail-blog/</loc>
		<lastmod>2025-11-11T13:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyfirma-firetail-working-together-for-complete-visibility-and-robust-api-security-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetail-ceo-jeremy-snyder-set-to-present-at-uk-cyber-week-2023-firetail-blog/</loc>
		<lastmod>2025-11-11T13:33:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-security-bridging-the-gap-between-application-and-security-teams-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:33:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyfirma-firetail-working-together-for-complete-visibility-and-robust-api-security-firetail-blog-3/</loc>
		<lastmod>2025-11-11T13:33:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introduction-to-rest-api-security-firetail-blog/</loc>
		<lastmod>2025-11-11T13:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-security-bridging-the-gap-between-application-and-security-teams-firetail-blog-3/</loc>
		<lastmod>2025-11-11T13:34:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetail-names-timo-ruppell-as-vice-president-of-product-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetail-names-timo-ruppell-as-vice-president-of-product-firetail-blog-3/</loc>
		<lastmod>2025-11-11T13:34:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetail-ceo-jeremy-snyder-set-to-present-at-uk-cyber-week-2023-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetail-ceo-jeremy-snyder-set-to-present-at-uk-cyber-week-2023-firetail-blog-3/</loc>
		<lastmod>2025-11-11T13:34:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introduction-to-rest-api-security-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:34:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moveit-a-series-of-breaches-all-enabled-by-apis-firetail-blog/</loc>
		<lastmod>2025-11-11T13:35:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-firetail-making-api-security-as-simple-as-import-setup-done-firetail-blog/</loc>
		<lastmod>2025-11-11T13:35:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moveit-a-series-of-breaches-all-enabled-by-apis-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:36:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploring-the-pros-and-cons-of-web-application-firewalls-wafs-firetail-blog/</loc>
		<lastmod>2025-11-11T13:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-firetail-making-api-security-as-simple-as-import-setup-done-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetail-raises-5m-to-accelerate-api-security-led-by-paladin-capital-group-firetail-blog/</loc>
		<lastmod>2025-11-11T13:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploring-the-pros-and-cons-of-web-application-firewalls-wafs-firetail-blog-2/</loc>
		<lastmod>2025-11-11T13:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-may-be-the-biggest-security-threat-your-family-has-never-heard-of/</loc>
		<lastmod>2025-11-11T13:37:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-exploit-googles-safety-tools-for-remote-wipe/</loc>
		<lastmod>2025-11-11T13:38:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hitachi-owned-globallogic-admits-data-stolen-on-10k-current-and-former-staff/</loc>
		<lastmod>2025-11-11T13:38:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/durchgesickerter-entwurf-zeigt-die-eu-will-den-datenschutz-schleifen-und-der-ki-vorfahrt-geben/</loc>
		<lastmod>2025-11-11T13:39:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/have-i-been-pwned-adds-1-96b-accounts-from-synthient-credential-data/</loc>
		<lastmod>2025-11-11T13:39:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-exploit-googles-safety-tools-for-remote-wipe-2/</loc>
		<lastmod>2025-11-11T13:39:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-linked-konni-apt-used-google-find-hub-to-erase-data-and-spy-on-defectors/</loc>
		<lastmod>2025-11-11T13:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hitachi-owned-globallogic-admits-data-stolen-on-10k-current-and-former-staff-2/</loc>
		<lastmod>2025-11-11T13:40:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploited-another-gladinet-triofox-zero-day-cve-2025-12480/</loc>
		<lastmod>2025-11-11T13:40:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-scam-uses-big-name-brands-to-steal-logins/</loc>
		<lastmod>2025-11-11T13:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploited-another-gladinet-triofox-zero-day-cve-2025-12480-2/</loc>
		<lastmod>2025-11-11T13:40:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-scam-uses-big-name-brands-to-steal-logins-2/</loc>
		<lastmod>2025-11-11T13:41:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-releases-security-update-to-fix-critical-code-execution-and-injection-flaws/</loc>
		<lastmod>2025-11-11T13:41:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-releases-security-update-to-fix-critical-code-execution-and-injection-flaws-2/</loc>
		<lastmod>2025-11-11T13:41:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-flaw-in-gladinets-triofox-file-sharing-product/</loc>
		<lastmod>2025-11-11T13:41:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploited-another-gladinet-triofox-zero-day-cve-2025-12480-3/</loc>
		<lastmod>2025-11-11T13:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-flaw-in-gladinets-triofox-file-sharing-product-2/</loc>
		<lastmod>2025-11-11T13:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-komex-android-rat-hits-hacker-forums-with-tiered-subscriptions/</loc>
		<lastmod>2025-11-11T13:42:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-awards-2025-die-beliebtesten-anbieter-von-securitytrainings-2025/</loc>
		<lastmod>2025-11-11T13:43:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-wird-in-der-logistik-zunehmend-zur-chefsache/</loc>
		<lastmod>2025-11-11T14:33:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-wird-in-der-logistik-zunehmend-zur-chefsache-2/</loc>
		<lastmod>2025-11-11T14:33:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-phishing-kampagne-nutzt-facebook-als-absender/</loc>
		<lastmod>2025-11-11T14:34:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-broken-access-control-still-tops-app-security-list/</loc>
		<lastmod>2025-11-11T14:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-phishing-kampagne-nutzt-facebook-als-absender-2/</loc>
		<lastmod>2025-11-11T14:35:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gnu-coreutils-9-9-brings-fixes-and-updates-across-essential-tools/</loc>
		<lastmod>2025-11-11T14:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-broken-access-control-still-tops-app-security-list-2/</loc>
		<lastmod>2025-11-11T14:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gnu-coreutils-9-9-brings-fixes-and-updates-across-essential-tools-2/</loc>
		<lastmod>2025-11-11T14:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoom-workplace-for-windows-flaw-allows-local-privilege-escalation/</loc>
		<lastmod>2025-11-11T14:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoom-workplace-for-windows-flaw-allows-local-privilege-escalation-2/</loc>
		<lastmod>2025-11-11T14:35:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-phishing-kampagne-nutzt-facebook-als-absender-3/</loc>
		<lastmod>2025-11-11T14:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrar-vulnerability-exploited-by-apt08-to-target-government-agencies/</loc>
		<lastmod>2025-11-11T14:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrar-vulnerability-exploited-by-apt08-to-target-government-agencies-2/</loc>
		<lastmod>2025-11-11T14:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridging-the-skills-gap-how-military-veterans-are-strengthening-cybersecurity/</loc>
		<lastmod>2025-11-11T14:38:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-in-ai-browsers/</loc>
		<lastmod>2025-11-11T14:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-kommission-will-dsgvo-fur-ki-und-cookie-tracking-lockern/</loc>
		<lastmod>2025-11-11T14:31:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-in-ai-browsers-2/</loc>
		<lastmod>2025-11-11T14:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-ernennt-joe-smolarski-zum-ceo/</loc>
		<lastmod>2025-11-11T14:32:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-der-akquisition-von-upsight-security-erganzt-arctic-wolf-seine-aurorasecurity-mit-ki-gestutzter-ransomware-pravention/</loc>
		<lastmod>2025-11-11T14:32:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-kommission-will-dsgvo-fur-ki-und-cookie-tracking-lockern-2/</loc>
		<lastmod>2025-11-11T14:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-ernennt-joe-smolarski-zum-ceo-2/</loc>
		<lastmod>2025-11-11T14:32:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-der-akquisition-von-upsight-security-erganzt-arctic-wolf-seine-aurorasecurity-mit-ki-gestutzter-ransomware-pravention-2/</loc>
		<lastmod>2025-11-11T14:32:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-in-ai-browsers-3/</loc>
		<lastmod>2025-11-11T14:33:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-ready-auth-without-enterprise-bloat/</loc>
		<lastmod>2025-11-11T15:30:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bigbear-ai-to-buy-ask-sage-strengthening-security-centric-ai-for-federal-agencies/</loc>
		<lastmod>2025-11-11T15:31:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eus-reforms-of-gdpr-ai-slated-by-privacy-activists-for-playing-into-big-techs-hands/</loc>
		<lastmod>2025-11-11T15:31:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-ready-auth-without-enterprise-bloat-2/</loc>
		<lastmod>2025-11-11T15:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bigbear-ai-to-buy-ask-sage-strengthening-security-centric-ai-for-federal-agencies-2/</loc>
		<lastmod>2025-11-11T15:32:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eus-reforms-of-gdpr-ai-slated-by-privacy-activists-for-playing-into-big-techs-hands-2/</loc>
		<lastmod>2025-11-11T15:32:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-26h1-is-coming-for-new-processors-only/</loc>
		<lastmod>2025-11-11T15:32:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-26h1-is-coming-for-new-processors-only-2/</loc>
		<lastmod>2025-11-11T15:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-ready-auth-without-enterprise-bloat-3/</loc>
		<lastmod>2025-11-11T15:32:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lost-your-iphone-beware-fake-find-my-messages-aiming-to-steal-your-apple-id/</loc>
		<lastmod>2025-11-11T15:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bigbear-ai-to-buy-ask-sage-strengthening-security-centric-ai-for-federal-agencies-3/</loc>
		<lastmod>2025-11-11T15:33:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-modern-patch-management-strategies-to-patch-faster-with-less-risk/</loc>
		<lastmod>2025-11-11T15:33:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionage-gefordert-aus-china-wer-ist-salt-typhoon/</loc>
		<lastmod>2025-11-11T15:34:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-partners-cheer-ai-moves-leading-the-charge-on-autonomous-security/</loc>
		<lastmod>2025-11-11T16:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fantasy-hub-russian-sold-android-rat-boasts-full-device-espionage-as-maas/</loc>
		<lastmod>2025-11-11T16:31:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-samsung-flaw-exploited-to-deliver-spyware-cve-2025-21042/</loc>
		<lastmod>2025-11-11T16:31:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhere-monitor/</loc>
		<lastmod>2025-11-11T16:31:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/globallogic-warns-10000-employees-of-data-theft-after-oracle-breach/</loc>
		<lastmod>2025-11-11T16:31:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-cpu-spike-led-to-uncovering-a-ransomhub-ransomware-attack/</loc>
		<lastmod>2025-11-11T16:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-endpoint-manager-vulnerabilities-let-attackers-write-files-anywhere-on-target-systems/</loc>
		<lastmod>2025-11-11T16:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-cpu-spike-led-to-uncovering-a-ransomhub-ransomware-attack-2/</loc>
		<lastmod>2025-11-11T16:33:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gootloader-is-back-using-a-new-font-trick-to-hide-malware-on-wordpress-sites/</loc>
		<lastmod>2025-11-11T16:33:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-endpoint-manager-vulnerabilities-let-attackers-write-files-anywhere-on-target-systems-2/</loc>
		<lastmod>2025-11-11T16:33:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-activity-surges-as-attacks-target-small-businesses/</loc>
		<lastmod>2025-11-11T16:33:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gootloader-is-back-using-a-new-font-trick-to-hide-malware-on-wordpress-sites-2/</loc>
		<lastmod>2025-11-11T16:34:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-cpu-spike-led-to-uncovering-a-ransomhub-ransomware-attack-3/</loc>
		<lastmod>2025-11-11T16:34:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arbeitsmarkt-im-dritten-quartal-2025-deutschland-sucht-mehr-spezialisten-fur-it-sicherheit/</loc>
		<lastmod>2025-11-11T16:34:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-activity-surges-as-attacks-target-small-businesses-2/</loc>
		<lastmod>2025-11-11T16:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-endpoint-manager-vulnerabilities-let-attackers-write-files-anywhere-on-target-systems-3/</loc>
		<lastmod>2025-11-11T16:34:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantumredirect-microsoft-365-nutzer-als-phishing-opfer/</loc>
		<lastmod>2025-11-11T17:30:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-spies-turn-googles-find-hub-into-remote-wipe-weapon/</loc>
		<lastmod>2025-11-11T17:31:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitcoin-queen-gets-11-years-in-prison-for-7-3-billion-bitcoin-scam/</loc>
		<lastmod>2025-11-11T17:31:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grandparents-to-c-suite-elder-fraud-reveals-gaps-in-human-centered-cybersecurity/</loc>
		<lastmod>2025-11-11T17:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimsuky-apt-takes-over-south-korean-androids-abuses-kakaotalk/</loc>
		<lastmod>2025-11-11T17:31:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-devices-targeted-by-konni-apt-in-find-hub-exploitation/</loc>
		<lastmod>2025-11-11T17:31:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-open-source-malware-at-the-gate-with-repository-firewall/</loc>
		<lastmod>2025-11-11T18:30:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monsta-ftp-remote-code-execution-vulnerability-cve-2025-34299/</loc>
		<lastmod>2025-11-11T18:31:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-route-redirect-the-phishing-tool-simplifying-global-microsoft-365-attacks/</loc>
		<lastmod>2025-11-11T18:31:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-defence-contractors-are-fortifying-security-camera-networks-for-high-stakes-live-events/</loc>
		<lastmod>2025-11-11T18:31:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arnicas-arnie-ai-reimagines-application-security-for-the-agentic-coding-era/</loc>
		<lastmod>2025-11-11T18:31:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-for-november-2025-snort-rules-and-prominent-vulnerabilities/</loc>
		<lastmod>2025-11-11T19:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zoom-vulnerability-exposes-windows-users-to-attacks/</loc>
		<lastmod>2025-11-11T19:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-kb5068781-the-first-windows-10-extended-security-update/</loc>
		<lastmod>2025-11-11T19:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-for-november-2025-snort-rules-and-prominent-vulnerabilities-2/</loc>
		<lastmod>2025-11-11T19:31:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/</loc>
		<lastmod>2025-11-11T19:32:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zoom-vulnerability-exposes-windows-users-to-attacks-2/</loc>
		<lastmod>2025-11-11T19:32:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5068861-kb5068865-cumulative-updates-released/</loc>
		<lastmod>2025-11-11T19:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-kb5068781-the-first-windows-10-extended-security-update-2/</loc>
		<lastmod>2025-11-11T19:32:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emergency-windows-10-update-fixes-esu-enrollment-bug/</loc>
		<lastmod>2025-11-11T19:33:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-for-november-2025-fix-for-0-day-and-other-62-vulnerabilities/</loc>
		<lastmod>2025-11-11T19:33:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-malware-maverick-hijacks-browser-sessions-to-target-brazils-biggest-banks/</loc>
		<lastmod>2025-11-11T19:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-november-2025-patch-tuesday-addresses-63-cves-cve-2025-62215/</loc>
		<lastmod>2025-11-11T20:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hitachi-subsidiary-globallogic-impacted-by-clops-attack-spree-on-oracle-customers/</loc>
		<lastmod>2025-11-11T20:31:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cl0p-ransomware-lists-nhs-uk-as-victim-days-after-washington-post-breach/</loc>
		<lastmod>2025-11-11T20:31:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-prompt-injection-is-breaking-digital-forensics-norms/</loc>
		<lastmod>2025-11-11T20:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nacha-revises-fraud-monitoring-rules-for-fis/</loc>
		<lastmod>2025-11-11T20:32:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/65-of-leading-ai-companies-found-leaking-secrets-on-github/</loc>
		<lastmod>2025-11-11T20:32:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-triofox-antivirus-feature-to-deploy-remote-access-tools/</loc>
		<lastmod>2025-11-11T20:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-23h2-home-and-pro-reach-end-of-support/</loc>
		<lastmod>2025-11-11T20:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-prompt-injection-is-breaking-digital-forensics-norms-2/</loc>
		<lastmod>2025-11-11T20:33:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/integrate-mojoauth-with-popular-saas-kits-like-shipfast-divjoy-saas-pegasus-and-supastarter-for-next-gen-passwordless-login/</loc>
		<lastmod>2025-11-11T21:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-addresses-63-defects-including-one-actively-exploited-zero-day/</loc>
		<lastmod>2025-11-11T21:31:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-rolls-out-ai-bug-bounty-program/</loc>
		<lastmod>2025-11-11T21:31:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-congress-moves-to-revive-cisa-2015-after-shutdown/</loc>
		<lastmod>2025-11-11T21:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/integrate-mojoauth-with-popular-saas-kits-like-shipfast-divjoy-saas-pegasus-and-supastarter-for-next-gen-passwordless-login-2/</loc>
		<lastmod>2025-11-11T21:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gaps-in-ai-governance-put-smbs-at-greater-cyber-risk/</loc>
		<lastmod>2025-11-11T21:32:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-addresses-63-defects-including-one-actively-exploited-zero-day-2/</loc>
		<lastmod>2025-11-11T21:32:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-rolls-out-ai-bug-bounty-program-2/</loc>
		<lastmod>2025-11-11T21:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beestation-rce-zero-day-puts-synology-devices-at-high-risk/</loc>
		<lastmod>2025-11-11T21:32:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-best-penetration-testing-service-providers-in-2025/</loc>
		<lastmod>2025-11-11T21:33:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-limitations-of-google-play-integrity-api-ex-safetynet/</loc>
		<lastmod>2025-11-11T22:30:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-security-update-summary-11-november-2025/</loc>
		<lastmod>2025-11-11T22:31:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere-monitor/</loc>
		<lastmod>2025-11-11T22:31:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synnovis-notifying-uk-providers-of-data-theft-in-2024-attack/</loc>
		<lastmod>2025-11-11T22:31:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-limitations-of-google-play-integrity-api-ex-safetynet-2/</loc>
		<lastmod>2025-11-11T22:31:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/holiday-fraud-trends-2025-the-top-cyber-threats-to-watch-this-season/</loc>
		<lastmod>2025-11-11T22:32:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-now-microsoft-flags-zero-day-critical-zero-click-bugs/</loc>
		<lastmod>2025-11-11T22:33:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-firewalls-to-the-cloud-unifying-security-policies-across-hybrid-environments/</loc>
		<lastmod>2025-11-11T23:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patchday-windows-server-updates-11-november-2025/</loc>
		<lastmod>2025-11-11T23:31:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patchday-windows-10-11-updates-11-november-2025/</loc>
		<lastmod>2025-11-11T23:31:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-npm-package-with-206k-downloads-targeted-github-for-credentials-updated/</loc>
		<lastmod>2025-11-11T23:31:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synology-fixes-beestation-zero-days-demoed-at-pwn2own-ireland/</loc>
		<lastmod>2025-11-11T23:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-mssp-mandate-visibility-into-data-risk-not-just-endpoints/</loc>
		<lastmod>2025-11-12T00:30:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-jahresbericht-2025-trotz-fortschritten-bei-der-cybersicherheit-weiterhin-hohe-verwundbarkeit/</loc>
		<lastmod>2025-11-12T00:31:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rechenzentren-ki-treibt-deren-verbreitung-auch-in-deutschland/</loc>
		<lastmod>2025-11-12T00:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-recommended-account-takeover-security-providers/</loc>
		<lastmod>2025-11-12T00:31:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-is-widespread-and-executives-use-it-the-most/</loc>
		<lastmod>2025-11-12T18:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-broker-kochava-agrees-to-change-business-practices-to-settle-lawsuit/</loc>
		<lastmod>2025-11-12T18:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-chatgpt-sich-selbst-eine-prompt-injection-zufugt/</loc>
		<lastmod>2025-11-12T18:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-want-more-from-their-threat-intelligence-platforms/</loc>
		<lastmod>2025-11-12T18:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credit-union-cybersecurity-crisis-2025-strategic-analysis-the-seceon-platform-imperative/</loc>
		<lastmod>2025-11-12T18:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-is-widespread-and-executives-use-it-the-most-2/</loc>
		<lastmod>2025-11-12T18:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-broker-kochava-agrees-to-change-business-practices-to-settle-lawsuit-2/</loc>
		<lastmod>2025-11-12T18:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-files-lawsuit-to-disrupt-massive-lighthouse-smishing-scheme/</loc>
		<lastmod>2025-11-12T18:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-sicherheit-fast-alle-llms-leaken-private-api-keys-auf-github-chatgpt-hat-schwachstellen/</loc>
		<lastmod>2025-11-12T18:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkcomet-spyware-resurfaces-disguised-as-fake-bitcoin-wallet/</loc>
		<lastmod>2025-11-12T18:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maryland-man-faces-federal-charges-for-crimes-allegedly-linked-to-764/</loc>
		<lastmod>2025-11-12T18:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-betrug-wird-zur-wachsenden-sorge-der-verbraucher/</loc>
		<lastmod>2025-11-12T18:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-files-lawsuit-to-disrupt-massive-lighthouse-smishing-scheme-2/</loc>
		<lastmod>2025-11-12T18:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-turned-citrix-cisco-0-day-exploits-into-custom-malware-hellscape/</loc>
		<lastmod>2025-11-12T18:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-apt-uses-remote-wipe-to-target-android-users/</loc>
		<lastmod>2025-11-12T18:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-turned-citrix-cisco-0-day-exploits-into-custom-malware-hellscape-2/</loc>
		<lastmod>2025-11-12T18:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-china-based-hackers-behind-1-billion-lighthouse-phishing-platform/</loc>
		<lastmod>2025-11-12T18:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-apt-uses-remote-wipe-to-target-android-users-2/</loc>
		<lastmod>2025-11-12T18:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-adds-emerging-threats-center-to-speed-detection-and-response/</loc>
		<lastmod>2025-11-12T18:06:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-turned-citrix-cisco-0-day-exploits-into-custom-malware-hellscape-3/</loc>
		<lastmod>2025-11-12T18:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-under-imminent-threat-act-now/</loc>
		<lastmod>2025-11-12T18:07:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-china-based-hackers-behind-1-billion-lighthouse-phishing-platform-2/</loc>
		<lastmod>2025-11-12T18:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-apt-uses-remote-wipe-to-target-android-users-3/</loc>
		<lastmod>2025-11-12T18:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lion-safe-zone/</loc>
		<lastmod>2025-11-12T19:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-malintent-coverage-guided-intent-fuzzing-framework-for-android/</loc>
		<lastmod>2025-11-12T19:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-government-unveils-long-awaited-landmark-cybersecurity-bill/</loc>
		<lastmod>2025-11-12T19:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advanced-hacker-seen-exploiting-cisco-citrix-zero-days/</loc>
		<lastmod>2025-11-12T19:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/army-officer-with-indo-pacific-experience-emerges-as-potential-cyber-command-nsa-pick/</loc>
		<lastmod>2025-11-12T19:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lion-safe-zone-2/</loc>
		<lastmod>2025-11-12T19:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-pins-cisco-citrix-zero-day-attacks-to-apt-group/</loc>
		<lastmod>2025-11-12T19:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advocacy-group-calls-on-openai-to-address-sora-2s-deepfake-risks/</loc>
		<lastmod>2025-11-12T19:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-exploits-meta-business-suite-to-target-smbs/</loc>
		<lastmod>2025-11-12T19:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cyber-intel-sharing-law-set-for-temporary-extension/</loc>
		<lastmod>2025-11-12T19:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-pins-cisco-citrix-zero-day-attacks-to-apt-group-2/</loc>
		<lastmod>2025-11-12T19:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-users-warned-over-privilege-elevation-flaw/</loc>
		<lastmod>2025-11-12T19:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advocacy-group-calls-on-openai-to-address-sora-2s-deepfake-risks-2/</loc>
		<lastmod>2025-11-12T19:05:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-will-defense-contracting-look-like-in-10-years/</loc>
		<lastmod>2025-11-12T19:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-duck-sca-adds-ai-model-scanning-to-strengthen-software-supply-chain-security/</loc>
		<lastmod>2025-11-12T19:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-will-defense-contracting-look-like-in-10-years-2/</loc>
		<lastmod>2025-11-12T19:06:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-duck-sca-adds-ai-model-scanning-to-strengthen-software-supply-chain-security-2/</loc>
		<lastmod>2025-11-12T19:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-now-supports-3rd-party-apps-for-native-passkey-management/</loc>
		<lastmod>2025-11-12T19:07:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-will-defense-contracting-look-like-in-10-years-3/</loc>
		<lastmod>2025-11-12T19:08:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-surfaces-sharp-rise-in-cybersecurity-incidents-involving-ai/</loc>
		<lastmod>2025-11-12T20:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-files-lawsuit-against-lighthouse-phishing-for-dummies-text-scammers/</loc>
		<lastmod>2025-11-12T20:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elon-musks-x-botched-its-security-key-switchover-locking-users-out/</loc>
		<lastmod>2025-11-12T20:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-data-to-defense-in-modern-security-operations/</loc>
		<lastmod>2025-11-12T20:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-imposes-24-hour-mobile-internet-blackout-for-travelers-returning-home/</loc>
		<lastmod>2025-11-12T20:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-danabot-windows-version-appears-in-the-threat-landscape-after-may-disruption/</loc>
		<lastmod>2025-11-12T20:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-data-to-defense-in-modern-security-operations-2/</loc>
		<lastmod>2025-11-12T20:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-imposes-24-hour-mobile-internet-blackout-for-travelers-returning-home-2/</loc>
		<lastmod>2025-11-12T20:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-danabot-windows-version-appears-in-the-threat-landscape-after-may-disruption-2/</loc>
		<lastmod>2025-11-12T20:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/applescript-abused-to-spread-fake-zoom-and-teams-macos-updates/</loc>
		<lastmod>2025-11-12T20:06:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/applescript-abused-to-spread-fake-zoom-and-teams-macos-updates-2/</loc>
		<lastmod>2025-11-12T20:06:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-data-to-defense-in-modern-security-operations-3/</loc>
		<lastmod>2025-11-12T20:06:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/niles-bold-claim-your-lan-architecture-is-fundamentally-broken/</loc>
		<lastmod>2025-11-12T20:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-holistic-security-analysis-of-google-fuchsias-and-gvisors-network-stack/</loc>
		<lastmod>2025-11-12T20:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-wallbleed-a-memory-disclosure-vulnerability-in-the-great-firewall-of-china/</loc>
		<lastmod>2025-11-12T20:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-ai-to-predict-and-disrupt-evolving-cyberattacks/</loc>
		<lastmod>2025-11-12T21:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operationalizing-threat-intelligence-and-ai-powered-cyber-defense/</loc>
		<lastmod>2025-11-12T21:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/while-white-house-demands-deterrence-trump-shrugs/</loc>
		<lastmod>2025-11-12T21:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-deepwatch-lays-off-dozens-citing-move-to-accelerate/</loc>
		<lastmod>2025-11-12T21:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hungry-for-data-inside-europols-secretive-ai-programme/</loc>
		<lastmod>2025-11-12T21:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-agencies-not-fully-patching-vulnerable-cisco-devices-amid-active-exploitation-cisa-warns/</loc>
		<lastmod>2025-11-12T21:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congressional-dems-press-governors-to-block-feds-from-accessing-state-dmv-data/</loc>
		<lastmod>2025-11-12T21:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-25-china-based-scammers-behind-lighthouse-phishing-for-dummies-kit/</loc>
		<lastmod>2025-11-12T22:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-cybercriminal-group-smishing-triad/</loc>
		<lastmod>2025-11-12T22:00:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-agencies-not-fully-patching-vulnerable-cisco-devices-amid-active-exploitation-cisa-warns-2/</loc>
		<lastmod>2025-11-12T22:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-to-dismantle-chinese-phishing-platform-behind-us-toll-scams/</loc>
		<lastmod>2025-11-12T22:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congressional-dems-press-governors-to-block-feds-from-accessing-state-dmv-data-2/</loc>
		<lastmod>2025-11-12T22:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-25-china-based-scammers-behind-lighthouse-phishing-for-dummies-kit-2/</loc>
		<lastmod>2025-11-12T22:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hscc-guidance-to-help-health-sector-navigate-ai-cyber-risks/</loc>
		<lastmod>2025-11-12T22:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mindgard-finds-sora-2-vulnerability-leaking-hidden-system-prompt-via-audio/</loc>
		<lastmod>2025-11-12T22:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-announces-strike-force-to-counter-southeast-asian-cyber-scams-sanctions-myanmar-armed-group/</loc>
		<lastmod>2025-11-12T23:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-deepwatch-lays-off-dozens-citing-move-to-accelerate-ai-investment/</loc>
		<lastmod>2025-11-12T23:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teams-schwachstellen-ermoglichen-nachrichtenmanipulation/</loc>
		<lastmod>2025-11-12T23:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-edge-lokaler-passwort-manager-kennt-master-passwort-nicht-mehr/</loc>
		<lastmod>2025-11-12T23:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-giant-kingfisher-rejects-sap-erp-upgrade-plan/</loc>
		<lastmod>2025-11-12T23:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cisos-need-to-own-ai-enterprise-risk/</loc>
		<lastmod>2025-11-12T23:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synnovis-to-notify-nhs-of-data-breach-after-nearly-18-months/</loc>
		<lastmod>2025-11-12T23:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dhs-kept-chicago-police-records-for-months-in-violation-of-domestic-espionage-rules/</loc>
		<lastmod>2025-11-12T23:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-under-imminent-threat-act-now-2/</loc>
		<lastmod>2025-11-12T23:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/filtert-linkedin-nachrichten-zeit-zum-exit/</loc>
		<lastmod>2025-11-12T23:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patchday-microsoft-office-updates-11-november-2025/</loc>
		<lastmod>2025-11-12T23:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-unveils-cyber-security-and-resilience-bill/</loc>
		<lastmod>2025-11-13T00:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-shutdown-deal-revives-key-cisa-grant-some-staffing/</loc>
		<lastmod>2025-11-13T00:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-launches-strike-force-to-combat-global-crypto-fraud/</loc>
		<lastmod>2025-11-13T00:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrixbleed-2-wreaks-havoc-as-zero-day-bug/</loc>
		<lastmod>2025-11-13T00:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-looks-to-dim-lighthouse-phishing-as-a-service-op/</loc>
		<lastmod>2025-11-13T00:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/creating-stability-in-nhi-management-across-multiple-clouds/</loc>
		<lastmod>2025-11-13T00:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-nhi-solutions-enhance-security-measures/</loc>
		<lastmod>2025-11-13T00:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/confidently-managing-your-nhis-security-posture/</loc>
		<lastmod>2025-11-13T00:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ensuring-scalability-in-your-nhi-security-practices/</loc>
		<lastmod>2025-11-13T00:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unprecedented-automation-indonesianfoods-pits-open-source-against-itself/</loc>
		<lastmod>2025-11-13T01:00:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-kommentar-zum-bsi-lagebericht-2025-deutschland-eines-der-top-ziele-cyberkrimineller/</loc>
		<lastmod>2025-11-13T01:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatbook-peer-recognized-as-a-strong-performer-in-the-2025-gartner-peer-insights-voice-of-the-customer-for-network-detection-and-response-for-the-third-consecutive-year/</loc>
		<lastmod>2025-11-13T04:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schatten-ki-braucht-absicherung-keine-verbote/</loc>
		<lastmod>2025-11-13T04:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-asks-us-court-to-shut-down-lighthouse-phishing-as-a-service-operation/</loc>
		<lastmod>2025-11-13T04:59:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-443-tinders-camera-roll-and-the-buffett-deepfake/</loc>
		<lastmod>2025-11-13T05:00:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwicklung-nachrustbarer-automationslosungen-fur-sichere-und-effiziente-kommunalarbeit-bei-fraunhofer-iosb-ast-in-ilmenau/</loc>
		<lastmod>2025-11-13T05:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatbook-peer-recognized-as-a-strong-performer-in-the-2025-gartner-peer-insights-voice-of-the-customer-for-network-detection-and-response-for-the-third-consecutive-year-2/</loc>
		<lastmod>2025-11-13T05:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatbook-peer-recognized-as-a-strong-performer-in-the-2025-gartner-peer-insights-voice-of-the-customer-for-network-detection-and-response-for-the-third-consecutive-year-3/</loc>
		<lastmod>2025-11-13T05:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-exploitation-of-cisco-and-citrix-0-day-vulnerabilities-allows-webshell-deployment/</loc>
		<lastmod>2025-11-13T06:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-using-rmm-tools-logmein-and-pdq-connect-to-deploy-malware-as-legitimate-software-2/</loc>
		<lastmod>2025-11-13T06:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-lighthouse-over-massive-phishing-attacks/</loc>
		<lastmod>2025-11-13T06:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-china-based-hackers-behind-1-billion-lighthouse-phishing-platform-3/</loc>
		<lastmod>2025-11-13T06:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-exploitation-of-cisco-and-citrix-0-day-vulnerabilities-allows-webshell-deployment-2/</loc>
		<lastmod>2025-11-13T06:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-lighthouse-over-massive-phishing-attacks-2/</loc>
		<lastmod>2025-11-13T06:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/welche-masnahmen-sollten-ergriffen-werden-bevor-man-ki-agenten-in-der-cybersecurity-einsetzt/</loc>
		<lastmod>2025-11-13T05:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-risiken-und-vermeidung-von-schatten-ki/</loc>
		<lastmod>2025-11-13T05:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-and-vanta-bridge-the-gap-between-continuous-security-testing-and-compliance-with-new-integration/</loc>
		<lastmod>2025-11-13T05:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automation-cant-fix-broken-security-basics/</loc>
		<lastmod>2025-11-13T06:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-browser-is-eating-your-security-stack/</loc>
		<lastmod>2025-11-13T06:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-using-rmm-tools-logmein-and-pdq-connect-to-deploy-malware-as-legitimate-software/</loc>
		<lastmod>2025-11-13T06:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miniatur-wunderland-kreditkartendatenabfluss-nach-cyberangriff/</loc>
		<lastmod>2025-11-13T06:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wanna-bet-scammers-are-playing-the-odds-better-than-you-are/</loc>
		<lastmod>2025-11-13T06:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sprout-open-source-bootloader-built-for-speed-and-security/</loc>
		<lastmod>2025-11-13T06:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-of-fake-bitcoin-tools-concealing-darkcomet-rat-malware/</loc>
		<lastmod>2025-11-13T06:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-active-exploitation-of-watchguard-firebox-outbounds-write-flaw/</loc>
		<lastmod>2025-11-13T07:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-netscaler-adc-and-gateway-flaw-allows-cross-site-scripting-xss-attacks/</loc>
		<lastmod>2025-11-13T07:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grokking-wenn-ki-chatbots-zu-phishing-helfern-werden/</loc>
		<lastmod>2025-11-13T07:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-46000-fake-npm-packages-flood-registry-in-worm-like-spam-attack/</loc>
		<lastmod>2025-11-13T07:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-netscaler-adc-and-gateway-flaw-allows-cross-site-scripting-xss-attacks-2/</loc>
		<lastmod>2025-11-13T07:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-nahe-apt-nutzt-windows-zero-day-fur-gezielte-spionageangriffe-zero-day-in-windows-bedroht-europas-diplomaten/</loc>
		<lastmod>2025-11-13T07:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cisos-need-to-know-about-new-tools-for-securing-mcp-servers/</loc>
		<lastmod>2025-11-13T07:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/filtert-linkedin-nachrichten-facebook-filterung-kaputt-zeit-zum-exit/</loc>
		<lastmod>2025-11-13T08:00:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cisos-need-to-know-about-new-tools-for-securing-mcp-servers-2/</loc>
		<lastmod>2025-11-13T08:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-security-is-broken-because-its-systems-cant-talk-to-each-other/</loc>
		<lastmod>2025-11-13T08:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-dell-data-lakehouse-flaw-allows-remote-attackers-to-escalate-privileges/</loc>
		<lastmod>2025-11-13T08:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kenya-kicks-off-code-nation-with-a-nod-to-cybersecurity/</loc>
		<lastmod>2025-11-13T08:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/filtert-linkedin-nachrichten-facebook-filterung-kaputt-zeit-zum-exit-2/</loc>
		<lastmod>2025-11-13T08:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-security-is-broken-because-its-systems-cant-talk-to-each-other-2/</loc>
		<lastmod>2025-11-13T08:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-67000-fake-npm-packages-flood-registry-in-worm-like-spam-attack/</loc>
		<lastmod>2025-11-13T08:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivisten-im-fadenkreuz-wenn-wasserwerke-zur-digitalen-kriegszone-werden/</loc>
		<lastmod>2025-11-13T08:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-vulnerabilities-in-cisco-and-citrix-targeted-by-apt-group-amazon-confirms/</loc>
		<lastmod>2025-11-13T08:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attack-targeting-windows-and-macos-users-to-deploy-infostealer-malware/</loc>
		<lastmod>2025-11-13T08:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-critical-watchguard-fireware-flaw-exposing-54000-fireboxes-to-no-login-attacks/</loc>
		<lastmod>2025-11-13T09:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-vulnerabilities-in-cisco-and-citrix-targeted-by-apt-group-amazon-confirms-2/</loc>
		<lastmod>2025-11-13T09:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quanten-und-supercomputer-helfen-dem-zufall-auf-die-sprunge-quantum-brilliance-cyberseq-und-luxprovide-kooperieren-bei-pqc/</loc>
		<lastmod>2025-11-13T09:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offener-brief-an-ministerien-ausbildung-und-cyber-abwehr-dringend-notig-lehrstuhl-fur-organisation-und-entwicklung-im-rechenzentrum-gefordert/</loc>
		<lastmod>2025-11-13T09:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-ernennt-allison-cerra-zum-chief-marketing-officer/</loc>
		<lastmod>2025-11-13T09:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ticketshop-infiltriert-hacker-erbeutet-kreditkartendaten-von-miniatur-wunderland/</loc>
		<lastmod>2025-11-13T09:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oktober-2025-angriffe-auf-deutsche-unternehmen-leicht-rucklaufig/</loc>
		<lastmod>2025-11-13T09:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/large-scale-spam-campaign-hits-npm-registry-with-43000-fake-packages/</loc>
		<lastmod>2025-11-13T09:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-alerts-advanced-threat-actor-exploits-cisco-ise-citrix-netscaler-zero-days/</loc>
		<lastmod>2025-11-13T09:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extension-grants-full-control-over-ethereum-wallet/</loc>
		<lastmod>2025-11-13T10:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitlab-vulnerabilities-expose-users-to-prompt-injection-attacks-and-data-theft/</loc>
		<lastmod>2025-11-13T10:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oktober-2025-angriffe-auf-deutsche-unternehmen-leicht-rucklaufig-2/</loc>
		<lastmod>2025-11-13T10:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/large-scale-spam-campaign-hits-npm-registry-with-43000-fake-packages-2/</loc>
		<lastmod>2025-11-13T10:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synnovis-finally-issues-breach-notification-after-2024-ransomware-attack/</loc>
		<lastmod>2025-11-13T10:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-economy-grew-by-just-0-1-in-third-quarter-amid-hit-from-jlr-cyber-attack/</loc>
		<lastmod>2025-11-13T10:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-phishing-angriff-auf-android-user-hacker-nutzen-googles-find-hub-um-ihre-spuren-zu-verschleiern/</loc>
		<lastmod>2025-11-13T10:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synnovis-finally-issues-breach-notification-after-2024-ransomware-attack-2/</loc>
		<lastmod>2025-11-13T10:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-passwords-how-behaviour-and-devices-shape-stronger-logins/</loc>
		<lastmod>2025-11-13T10:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-watchguard-firewall-flaw-exploited-in-attacks/</loc>
		<lastmod>2025-11-13T10:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-authorities-takedown-1025-servers-linked-to-rhadamanthys-venomrat-and-elysium/</loc>
		<lastmod>2025-11-13T11:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kibana-vulnerabilities-expose-systems-to-ssrf-and-xss-attacks/</loc>
		<lastmod>2025-11-13T11:00:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-passwords-how-behaviour-and-devices-shape-stronger-logins-2/</loc>
		<lastmod>2025-11-13T11:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-cisco-0-days-ai-bug-bounties-crypto-heists-state-linked-leaks-and-20-more-stories/</loc>
		<lastmod>2025-11-13T11:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-watchguard-firewall-flaw-exploited-in-attacks-2/</loc>
		<lastmod>2025-11-13T11:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-authorities-takedown-1025-servers-linked-to-rhadamanthys-venomrat-and-elysium-2/</loc>
		<lastmod>2025-11-13T11:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/improve-collaboration-to-hit-back-at-rising-fraud-says-techuk/</loc>
		<lastmod>2025-11-13T11:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moge-die-sicherheit-mit-dir-sein-was-sicherheitsverantwortliche-von-star-wars-lernen-konnen/</loc>
		<lastmod>2025-11-13T11:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-microsoft-fixt-den-speicherfressenden-task-manager/</loc>
		<lastmod>2025-11-13T11:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-generated-content-is-fueling-next-gen-phishing-and-bec-attacks-detection-and-defense-strategies/</loc>
		<lastmod>2025-11-13T11:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dns-ddos-attacks-explained-and-why-cloud-dns-is-the-solution/</loc>
		<lastmod>2025-11-13T11:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unleashing-the-kraken-ransomware-group/</loc>
		<lastmod>2025-11-13T12:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhs-supplier-ends-probe-into-ransomware-attack-that-contributed-to-patient-death/</loc>
		<lastmod>2025-11-13T12:00:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rhadamanthys-infostealer-operation-disrupted-by-law-enforcement/</loc>
		<lastmod>2025-11-13T12:00:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations/</loc>
		<lastmod>2025-11-13T12:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-attacks-come-faster-than-patches-why-2026-will-be-the-year-of-machine-speed-security/</loc>
		<lastmod>2025-11-13T12:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-dismantles-rhadamanthys-venom-rat-and-elysium-botnet-in-global-crackdown/</loc>
		<lastmod>2025-11-13T12:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-sicherer-hybridbetrieb-braucht-netzwerk-observability-uberwachung-und-netops-hybrider-cloud-umgebungen/</loc>
		<lastmod>2025-11-13T12:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/61-000-btc-ergaunert-fast-12-jahre-haft-fur-chinesische-bitcoin-queen/</loc>
		<lastmod>2025-11-13T12:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-business-logic-abuse-what-you-need-to-know/</loc>
		<lastmod>2025-11-13T13:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guest-essay-how-to-defend-against-decision-mimicry-a-practical-ai-era-checklist-for-leaders/</loc>
		<lastmod>2025-11-13T13:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-hash-function-in-cryptography/</loc>
		<lastmod>2025-11-13T13:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ssl-tls-timeline-evolution-from-ssl-to-tls-1-3/</loc>
		<lastmod>2025-11-13T13:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-pki-perfect-storm-how-to-kill-three-birds-with-one-stone-spoiler-the-stone-is-automation/</loc>
		<lastmod>2025-11-13T13:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unlocking-cloud-security-introducing-the-new-aws-key-rotation-feature-in-ciphertrust-cloud-key-management/</loc>
		<lastmod>2025-11-13T13:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-gartner-ranks-threatbook-a-strong-performer-in-ndr-for-the-third-consecutive-year/</loc>
		<lastmod>2025-11-13T13:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-exploits-hit-cisco-ise-and-citrix-systems-in-an-advanced-campaign/</loc>
		<lastmod>2025-11-13T13:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-wird-ein-effektives-24-7-monitoring-sowie-managed-detection-and-response-unverzichtbar/</loc>
		<lastmod>2025-11-13T13:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funktionen-zum-sicheren-auswahlen-verwalten-und-skalieren-von-vertrauenswurdigen-ki-agenten/</loc>
		<lastmod>2025-11-13T13:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unlocking-cloud-security-introducing-the-new-aws-key-rotation-feature-in-ciphertrust-cloud-key-management-2/</loc>
		<lastmod>2025-11-13T13:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rhadamanthys-malware-admin-rattled-as-cops-seize-a-thousand-plus-servers/</loc>
		<lastmod>2025-11-13T13:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-3-malware-families-in-q4-how-to-keep-your-soc-ready/</loc>
		<lastmod>2025-11-13T13:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rhadamanthys-malware-admin-rattled-as-cops-seize-a-thousand-plus-servers-2/</loc>
		<lastmod>2025-11-13T13:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-watchguard-firebox-microsoft-windows-and-gladinet-triofox-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-11-13T13:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-3-malware-families-in-q4-how-to-keep-your-soc-ready-2/</loc>
		<lastmod>2025-11-13T13:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-feds-to-fully-patch-actively-exploited-cisco-flaws/</loc>
		<lastmod>2025-11-13T13:05:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rhadamanthys-malware-admin-rattled-as-cops-seize-a-thousand-plus-servers-3/</loc>
		<lastmod>2025-11-13T13:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-active-exploitation-of-windows-kernel-0-day-enabling-privilege-escalation/</loc>
		<lastmod>2025-11-13T13:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-watchguard-firebox-microsoft-windows-and-gladinet-triofox-flaws-to-its-known-exploited-vulnerabilities-catalog-2/</loc>
		<lastmod>2025-11-13T13:06:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-and-vanta-bridge-the-gap-between-continuous-security-testing-and-compliance-with-new-integration-2/</loc>
		<lastmod>2025-11-13T13:06:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-3-0-dismantles-three-major-malware-networks/</loc>
		<lastmod>2025-11-13T13:07:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-experten-ausern-sich-zum-bsi-lagebericht-2025/</loc>
		<lastmod>2025-11-13T13:08:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-and-vanta-bridge-the-gap-between-continuous-security-testing-and-compliance-with-new-integration-3/</loc>
		<lastmod>2025-11-13T13:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-classroom-management-styles-and-how-to-find-the-right-one-for-your-students/</loc>
		<lastmod>2025-11-13T13:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/government-funding-bill-temporarily-revives-cybersecurity-information-sharing-law/</loc>
		<lastmod>2025-11-13T13:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-schaltet-schadsoftware-ab/</loc>
		<lastmod>2025-11-13T13:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-police-reveal-takedowns-of-three-key-cybercrime-tools/</loc>
		<lastmod>2025-11-13T13:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legitime-werbeplattformen-als-einfallstore-fur-cyberangriffe/</loc>
		<lastmod>2025-11-13T14:00:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-pushes-emergency-patch-for-9-9-rated-cve-2025-42887-after-full-takeover-risk/</loc>
		<lastmod>2025-11-13T14:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-android-based-photo-frames-download-malware-on-boot/</loc>
		<lastmod>2025-11-13T14:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-json-storage-for-hosting-and-delivering-malware-via-trojanized-code/</loc>
		<lastmod>2025-11-13T14:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-infiltrate-npm-registry-with-43000-spam-packages-linger-for-nearly-two-years/</loc>
		<lastmod>2025-11-13T14:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-sora-2-vulnerability-allows-exposure-of-hidden-system-prompts-from-audio-data/</loc>
		<lastmod>2025-11-13T14:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-pushes-emergency-patch-for-9-9-rated-cve-2025-42887-after-full-takeover-risk-2/</loc>
		<lastmod>2025-11-13T14:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-chrome-extension-safery-steals-ethereum-wallet-seed-phrases-using-sui-blockchain/</loc>
		<lastmod>2025-11-13T14:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-economy-grew-by-just-0-1-in-third-quarter-after-hit-from-jlr-cyber-attack/</loc>
		<lastmod>2025-11-13T14:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-awards-2025-die-beliebtesten-anbieter-von-enterprise-network-firewalls-2025/</loc>
		<lastmod>2025-11-13T14:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-polizei-nimmt-uber-1-000-malware-server-vom-netz/</loc>
		<lastmod>2025-11-13T14:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-checksec-without-boundaries-with-checksec-anywhere/</loc>
		<lastmod>2025-11-13T15:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gdpr-data-subject-rights-in-2025-and-beyond/</loc>
		<lastmod>2025-11-13T15:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rogue-mcp-servers-can-take-over-cursors-built-in-browser/</loc>
		<lastmod>2025-11-13T15:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/otus-neuer-supercomputer-am-10-november-2025-in-betrieb-genommen/</loc>
		<lastmod>2025-11-13T15:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/extra-extra-read-all-about-it-washington-post-clobbered-in-clop-caper/</loc>
		<lastmod>2025-11-13T15:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-collaboration-apps-face-security-scrutiny-again/</loc>
		<lastmod>2025-11-13T15:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patched/</loc>
		<lastmod>2025-11-13T15:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-rolls-out-screen-capture-prevention-for-teams-users/</loc>
		<lastmod>2025-11-13T15:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-emails-alert-how-spam-filters-can-steal-your-email-logins-in-an-instant/</loc>
		<lastmod>2025-11-13T15:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-package-with-206k-downloads-targeting-github-repositories-to-steal-tokens/</loc>
		<lastmod>2025-11-13T15:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-collaboration-apps-face-security-scrutiny-again-2/</loc>
		<lastmod>2025-11-13T15:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patched-2/</loc>
		<lastmod>2025-11-13T15:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartapesg-uses-clickfix-to-deploy-netsupport-rat/</loc>
		<lastmod>2025-11-13T15:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coyote-maverick-banking-trojans-run-rampant-in-brazil/</loc>
		<lastmod>2025-11-13T15:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-pay-increases-7-as-budget-growth-slows/</loc>
		<lastmod>2025-11-13T15:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-fractional-ciso-and-how-can-it-help-european-b2b-companies/</loc>
		<lastmod>2025-11-13T15:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-fractional-ciso-and-how-can-it-help-european-b2b-companies-2/</loc>
		<lastmod>2025-11-13T15:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stellar-startup-security-technology-vendors-to-know-in-2025-2/</loc>
		<lastmod>2025-11-13T16:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stellar-startup-security-technology-vendors-to-know-in-2025/</loc>
		<lastmod>2025-11-13T16:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-legal-challenges-in-cybersecurity-legals-new-role-in-cybersecurity/</loc>
		<lastmod>2025-11-13T16:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-legal-challenges-in-cybersecurity-legals-new-role-in-cybersecurity-2/</loc>
		<lastmod>2025-11-13T16:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-targets-customers-of-major-italian-web-hosting-provider/</loc>
		<lastmod>2025-11-13T16:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-targets-customers-of-major-italian-web-hosting-provider-2/</loc>
		<lastmod>2025-11-13T16:00:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-key-cyber-laws-are-back-as-president-signs-bill-to-end-shutdown/</loc>
		<lastmod>2025-11-13T16:00:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-key-cyber-laws-are-back-as-president-signs-bill-to-end-shutdown-2/</loc>
		<lastmod>2025-11-13T16:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-targets-malware-networks-in-global-crackdown/</loc>
		<lastmod>2025-11-13T16:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/broken-wizard-forces-microsoft-to-issue-outband-windows-10-patch/</loc>
		<lastmod>2025-11-13T16:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-round-of-europols-operation-endgame-dismantled-rhadamanthys-venom-rat-and-elysium-botnet/</loc>
		<lastmod>2025-11-13T16:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-debuts-private-ai-compute-to-protect-data-in-cloud-ai/</loc>
		<lastmod>2025-11-13T16:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indonesianfoods-npm-worm-publishes-44000-malicious-packages/</loc>
		<lastmod>2025-11-13T16:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaspersky-findet-kritische-mangel-in-telematik-okosystemen-zero-day-schwachstelle-in-vernetzten-fahrzeugen-entdeckt/</loc>
		<lastmod>2025-11-13T16:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-power-related-side-channel-attacks-using-the-android-sensor-framework/</loc>
		<lastmod>2025-11-13T17:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metrics-every-ciso-needs-for-threat-led-defense-success/</loc>
		<lastmod>2025-11-13T17:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-rapid-ai-adoption-is-creating-an-exposure-gap/</loc>
		<lastmod>2025-11-13T17:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-power-related-side-channel-attacks-using-the-android-sensor-framework-2/</loc>
		<lastmod>2025-11-13T17:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-security-made-the-owasp-top-ten-this-changes-nothing/</loc>
		<lastmod>2025-11-13T17:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/book-review-the-business-of-secrets/</loc>
		<lastmod>2025-11-13T17:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-authorities-propose-law-to-set-minimum-cyber-standards-for-critical-sectors/</loc>
		<lastmod>2025-11-13T17:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kazakhstan-becomes-latest-country-to-ban-lgbt-propaganda-online/</loc>
		<lastmod>2025-11-13T17:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis-2-in-deutschland-spater-start-erfordert-nun-vertrauen-und-klarheit-zu-schaffen/</loc>
		<lastmod>2025-11-13T17:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-25-10s-rusty-sudo-holes-quickly-welded-shut/</loc>
		<lastmod>2025-11-13T17:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-hits-rhadamanthys-venomrat-elysium-malware-seize-1025-servers/</loc>
		<lastmod>2025-11-13T17:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-authorities-propose-law-to-set-minimum-cyber-standards-for-critical-sectors-2/</loc>
		<lastmod>2025-11-13T17:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-spam-filter-alerts-are-hitting-inboxes/</loc>
		<lastmod>2025-11-13T17:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-lighthouse-phishing-service-after-1b-scams-target-millions/</loc>
		<lastmod>2025-11-13T17:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-post-data-breach-impacts-nearly-10k-employees-contractors/</loc>
		<lastmod>2025-11-13T17:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-spam-filter-alerts-are-hitting-inboxes-2/</loc>
		<lastmod>2025-11-13T17:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kerberoasting-in-2025-how-to-protect-your-service-accounts/</loc>
		<lastmod>2025-11-13T17:06:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-lighthouse-phishing-service-after-1b-scams-target-millions-2/</loc>
		<lastmod>2025-11-13T17:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orgs-move-to-sso-passkeys-to-solve-bad-password-habits/</loc>
		<lastmod>2025-11-13T17:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-post-data-breach-impacts-nearly-10k-employees-contractors-2/</loc>
		<lastmod>2025-11-13T17:07:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-post-confirms-data-on-nearly-10000-people-stolen-from-its-oracle-environment/</loc>
		<lastmod>2025-11-13T18:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-federal-agencies-to-patch-flawed-cisco-firewalls-amid-active-exploitation-across-the-us-government/</loc>
		<lastmod>2025-11-13T18:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infrastruktur-des-infostealers-rhadamanthys-sowie-venomrat-und-elysium-zerschlagen/</loc>
		<lastmod>2025-11-13T18:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentare-zum-bericht-zur-lage-der-it-sicherheit-2025-des-bsi/</loc>
		<lastmod>2025-11-13T18:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scottish-government-to-launch-cyber-observatory/</loc>
		<lastmod>2025-11-13T18:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-abuse-whatsapp-screen-sharing-to-steal-otps-and-funds/</loc>
		<lastmod>2025-11-13T18:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-take-down-three-cybercrime-operations-in-latest-round-of-whackmole/</loc>
		<lastmod>2025-11-13T18:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attck-v18-the-detection-overhaul-youve-been-waiting-for/</loc>
		<lastmod>2025-11-13T18:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-fraud-in-customer-verification-and-real-time-payments/</loc>
		<lastmod>2025-11-13T18:12:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-bitcoin-queen-sentenced-in-fraud-case/</loc>
		<lastmod>2025-11-13T18:13:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ms-task-manager-turns-30-creator-reveals-how-a-very-unixy-impulse-endured-in-windows/</loc>
		<lastmod>2025-11-13T18:13:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpes-post-juniper-vision-ai-driven-security-at-enterprise-scale/</loc>
		<lastmod>2025-11-13T19:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-holiday-shopping-is-a-stress-test-for-password-security/</loc>
		<lastmod>2025-11-13T19:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eol-software-gefahrdet-unternehmenssicherheit/</loc>
		<lastmod>2025-11-13T19:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-exploited-through-ssrf-flaw-in-custom-gpt-actions/</loc>
		<lastmod>2025-11-13T19:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2025-gigaom-anti-phishing-radar-key-takeaways-for-navigating-the-evolving-email-threat-landscape/</loc>
		<lastmod>2025-11-13T20:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/viasat-and-the-terrible-horrible-no-good-very-bad-day/</loc>
		<lastmod>2025-11-13T20:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-safery-steals-ethereum-wallet-seed-phrases/</loc>
		<lastmod>2025-11-13T20:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-patches-severe-code-injection-flaw-enabling-system-takeover/</loc>
		<lastmod>2025-11-13T20:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-china-based-lighthouse-phishing-service-after-1b-scams-target-millions/</loc>
		<lastmod>2025-11-13T20:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rce-flaw-in-imunifyav-puts-millions-of-linux-hosted-sites-at-risk/</loc>
		<lastmod>2025-11-13T20:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sleepers-awake/</loc>
		<lastmod>2025-11-13T21:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomed-cto-falls-on-sword-refuses-to-pay-extortion-demand/</loc>
		<lastmod>2025-11-13T21:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-disrupts-more-malware/</loc>
		<lastmod>2025-11-13T21:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-dismantles-1025-malware-servers/</loc>
		<lastmod>2025-11-13T21:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers-2/</loc>
		<lastmod>2025-11-13T21:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-create-4300-fake-travel-sites-to-steal-hotel-guests-payment-data/</loc>
		<lastmod>2025-11-13T21:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-red-teaming-is-different-from-traditional-security/</loc>
		<lastmod>2025-11-13T21:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2025-healthcare-cyber-crisis-unified-ai-defense-against-10-3m-breaches/</loc>
		<lastmod>2025-11-13T21:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-exchanges-hacked-again-for-over-100-million/</loc>
		<lastmod>2025-11-13T22:00:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-servicenow-agentic-ai-security-assessment-appomni/</loc>
		<lastmod>2025-11-13T22:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-red-teaming-is-different-from-traditional-security-2/</loc>
		<lastmod>2025-11-13T22:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2025-healthcare-cyber-crisis-unified-ai-defense-against-10-3m-breaches-2/</loc>
		<lastmod>2025-11-13T22:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-calls-akira-top-five-ransomware-variant-out-of-130-targeting-us-businesses/</loc>
		<lastmod>2025-11-13T22:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adversaries-exploit-the-blind-spots-in-your-easm-strategy/</loc>
		<lastmod>2025-11-13T22:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-nhs-named-in-clop-gangs-exploits-of-oracle-zero-days/</loc>
		<lastmod>2025-11-13T22:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-uk-probes-chinese-made-electric-buses/</loc>
		<lastmod>2025-11-13T22:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-43000-npm-spam-packages-hid-in-plain-sight-for-two-years/</loc>
		<lastmod>2025-11-13T22:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeping-nhis-safe-from-unauthorized-access/</loc>
		<lastmod>2025-11-13T22:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stay-reassured-with-consistent-nhi-security-updates/</loc>
		<lastmod>2025-11-13T22:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enhanced-support-systems-for-effective-nhi-management/</loc>
		<lastmod>2025-11-13T23:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-incorporating-gradients-to-rules/</loc>
		<lastmod>2025-11-13T23:00:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-akira-gang-has-received-nearly-250-million-in-ransoms/</loc>
		<lastmod>2025-11-13T23:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-first-autonomous-humanoid-robot-staggers-and-falls-on-debut/</loc>
		<lastmod>2025-11-13T23:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploited-cisco-ise-zero-day/</loc>
		<lastmod>2025-11-13T23:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-gitlab-vulnerabilities-allow-prompt-injection-and-data-theft/</loc>
		<lastmod>2025-11-13T23:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-akira-ransomware-linux-encryptor-targeting-nutanix-vms/</loc>
		<lastmod>2025-11-13T23:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-indonesianfoods-worm-floods-npm-with-100000-packages/</loc>
		<lastmod>2025-11-13T23:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-fumble-cisco-patches-as-china-linked-hackers-strike/</loc>
		<lastmod>2025-11-13T23:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-spies-told-claude-to-break-into-about-30-critical-orgs-some-attacks-succeeded/</loc>
		<lastmod>2025-11-14T00:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepwatch-axonius-carry-out-steep-layoffs-amid-surge-in-ai/</loc>
		<lastmod>2025-11-14T00:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-bots-to-buyers-with-agentic-ai-bot-management-becomes-core-infrastructure/</loc>
		<lastmod>2025-11-14T00:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-actively-engaged-in-ransomware-attacks-against-critical-sectors/</loc>
		<lastmod>2025-11-14T00:00:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kerberoasting-im-jahr-2025-so-schutzen-sie-ihre-servicekonten/</loc>
		<lastmod>2025-11-14T00:00:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-entwicklerregistrierung-google-rudert-ein-bisschen-zuruck/</loc>
		<lastmod>2025-11-14T00:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-exposes-advanced-apt-exploiting-cisco-ise-rce-and-citrix-bleed-two-as-simultaneous-zero-days/</loc>
		<lastmod>2025-11-14T01:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weltweite-softwarepiraterie-deutschland-von-platz-11-auf-6-vorgeruckt/</loc>
		<lastmod>2025-11-14T01:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisumsetzung-im-bundestag-beschlossen/</loc>
		<lastmod>2025-11-14T01:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authentication-provider-types-a-guide-to-best-practices/</loc>
		<lastmod>2025-11-14T04:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-opens-door-to-new-id-challenges-report/</loc>
		<lastmod>2025-11-14T04:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsvorfalle-bei-schmidts-und-techem-co-nov-2025/</loc>
		<lastmod>2025-11-14T05:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authentication-provider-types-a-guide-to-best-practices-2/</loc>
		<lastmod>2025-11-14T05:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kubernetes-overlords-decide-ingress-nginx-isnt-worth-saving/</loc>
		<lastmod>2025-11-14T05:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-opens-door-to-new-id-challenges-report-2/</loc>
		<lastmod>2025-11-14T05:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-strike-force-takes-aim-at-southeast-asian-scam-centers/</loc>
		<lastmod>2025-11-14T05:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-hit-by-yet-another-data-breach-this-october/</loc>
		<lastmod>2025-11-14T05:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortiweb-flaw-with-public-poc-exploited-to-create-admin-users/</loc>
		<lastmod>2025-11-14T05:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kraken-ransomware-benchmarks-systems-for-optimal-encryption-choice/</loc>
		<lastmod>2025-11-14T05:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defining-self-sovereign-identity-in-authentication-systems/</loc>
		<lastmod>2025-11-14T05:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-by-design-and-secure-by-default-badges-from-secureiqlab-and-why-they-matter-in-waap/</loc>
		<lastmod>2025-11-14T05:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-espionage-oriented-group-sidewinder/</loc>
		<lastmod>2025-11-14T06:00:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-am-arbeitsplatz-machen-identity-resilience-unerlasslich/</loc>
		<lastmod>2025-11-14T06:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defining-self-sovereign-identity-in-authentication-systems-2/</loc>
		<lastmod>2025-11-14T06:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-employees-take-control-of-ai/</loc>
		<lastmod>2025-11-14T06:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-by-design-and-secure-by-default-badges-from-secureiqlab-and-why-they-matter-in-waap-2/</loc>
		<lastmod>2025-11-14T06:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-espionage-oriented-group-sidewinder-2/</loc>
		<lastmod>2025-11-14T06:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-november-14-2025/</loc>
		<lastmod>2025-11-14T06:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-hit-by-new-data-breach-in-october-exposing-user-information/</loc>
		<lastmod>2025-11-14T06:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-pan-os-flaw-lets-attackers-force-firewall-reboots-via-malicious-packets/</loc>
		<lastmod>2025-11-14T06:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lumma-stealer-leverages-browser-fingerprinting-for-data-theft-and-stealthy-c2-communications/</loc>
		<lastmod>2025-11-14T06:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortiweb-zero-day-exploited-to-gain-full-admin-access/</loc>
		<lastmod>2025-11-14T06:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-netzwerk-namens-payroll-pirates-entdeckt/</loc>
		<lastmod>2025-11-14T06:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-umsetzung-bundestag-beschliest-endlich-cybersicherheitsgesetz/</loc>
		<lastmod>2025-11-14T06:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-mobile-privacy-in-real-time-with-predictive-adversarial-defense/</loc>
		<lastmod>2025-11-14T06:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/los-alamos-researchers-warn-ai-may-upend-national-security/</loc>
		<lastmod>2025-11-14T07:00:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkout-com-suffers-data-breach-as-shinyhunters-attack-cloud-storage/</loc>
		<lastmod>2025-11-14T07:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-netzwerk-namens-payroll-pirates-entdeckt-2/</loc>
		<lastmod>2025-11-14T07:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-akira-ransomware-has-extracted-42m-after-targeting-hundreds/</loc>
		<lastmod>2025-11-14T07:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alte-linux-schwachstelle-wird-erneut-aktiv-ausgenutzt-ransomware-gruppen-nutzen-linux-schwachstelle-cisa-schlagt-alarm/</loc>
		<lastmod>2025-11-14T07:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/press-release-cio100-and-cso30-asean-awards-gala-2025-celebrate-regional-excellence-in-technology-leadership/</loc>
		<lastmod>2025-11-14T07:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-cyberattack-disrupts-danish-government-and-defense-websites/</loc>
		<lastmod>2025-11-14T08:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnung-der-weko-com-nach-hack-vor-phishing-mail-nov-2025/</loc>
		<lastmod>2025-11-14T08:00:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-security-strategy-is-failing-before-it-even-starts/</loc>
		<lastmod>2025-11-14T08:00:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-introduces-premium-feature-to-prevent-screenshots-and-screen-recording/</loc>
		<lastmod>2025-11-14T08:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/press-release-cio100-and-cso30-asean-awards-gala-2025-celebrate-regional-excellence-in-technology-leadership-2/</loc>
		<lastmod>2025-11-14T08:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protokollierungspflicht-bringt-neue-sicherheitsrisiken-warum-die-protokollpflicht-im-eu-ai-act-zum-sicherheitsrisiko-werden-kann/</loc>
		<lastmod>2025-11-14T08:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-key-cybersecurity-trends-to-know-in-2025/</loc>
		<lastmod>2025-11-14T08:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-imunify360-vulnerability-exposes-millions-of-linux-hosted-sites-to-rce-attacks/</loc>
		<lastmod>2025-11-14T08:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-photo-frame-app-infects-devices-with-malware-allows-full-remote-takeover/</loc>
		<lastmod>2025-11-14T09:00:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teil-3-der-operation-endgame-europol-schaltet-1-025-server-ab/</loc>
		<lastmod>2025-11-14T09:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gegen-kms38-beliebter-windows-aktivierungs-hack-funktioniert-nicht-mehr/</loc>
		<lastmod>2025-11-14T09:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-key-cybersecurity-trends-to-know-in-2025-2/</loc>
		<lastmod>2025-11-14T09:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/without-a-vciso-your-startups-security-is-running-on-luck/</loc>
		<lastmod>2025-11-14T09:59:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-reports-major-drop-in-memory-bugs-as-rust-adoption-accelerates/</loc>
		<lastmod>2025-11-14T09:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsvorfalle-bei-schmidts-techem-tecvia-co-nov-2025/</loc>
		<lastmod>2025-11-14T09:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clop-claims-it-hacked-the-nhs-which-bit-your-guess-is-as-good-as-theirs/</loc>
		<lastmod>2025-11-14T10:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zoho-analytics-plus-flaw-allows-attackers-to-run-arbitrary-sql-queries/</loc>
		<lastmod>2025-11-14T10:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-post-notifies-10000-individuals-affected-in-oracle-linked-data-theft/</loc>
		<lastmod>2025-11-14T10:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-post-oracle-e-suite-breach-exposes-data-of-over-9000-staff-and-contractors/</loc>
		<lastmod>2025-11-14T10:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortiweb-flaw-actively-exploited-in-the-wild-before-companys-silent-patch/</loc>
		<lastmod>2025-11-14T10:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-degradation-in-ai-generated-code-a-threat-vector-cisos-cant-ignore/</loc>
		<lastmod>2025-11-14T10:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products/</loc>
		<lastmod>2025-11-14T11:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germanys-bsi-issues-guidelines-to-counter-evasion-attacks-targeting-llms/</loc>
		<lastmod>2025-11-14T11:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-degradation-in-ai-generated-code-a-threat-vector-cisos-cant-ignore-2/</loc>
		<lastmod>2025-11-14T11:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-warns-of-critical-auth-bypass-flaw-in-dsl-series-routers/</loc>
		<lastmod>2025-11-14T11:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products-2/</loc>
		<lastmod>2025-11-14T11:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-use-anthropics-ai-to-launch-automated-cyber-espionage-campaign/</loc>
		<lastmod>2025-11-14T11:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germanys-bsi-issues-guidelines-to-counter-evasion-attacks-targeting-llms-2/</loc>
		<lastmod>2025-11-14T11:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/now-patched-fortinet-fortiweb-flaw-exploited-in-attacks-to-create-admin-accounts/</loc>
		<lastmod>2025-11-14T11:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-files-lawsuit-to-dismantle-lighthouse-smishing-kit/</loc>
		<lastmod>2025-11-14T11:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-106-zertifiziert-qualifiziert-weitergebildet-cybersicherheitskompetenz-im-wandel/</loc>
		<lastmod>2025-11-14T11:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-studios-fuhrt-trainingsinhalte-fur-branchenfuhrende-schulungen-zusammen/</loc>
		<lastmod>2025-11-14T11:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/now-patched-fortinet-fortiweb-flaw-exploited-in-attacks-to-create-admin-accounts-2/</loc>
		<lastmod>2025-11-14T11:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-deckt-malvertising-netzwerk-payroll-pirates-auf/</loc>
		<lastmod>2025-11-14T11:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-files-lawsuit-to-dismantle-lighthouse-smishing-kit-2/</loc>
		<lastmod>2025-11-14T11:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betriebssystem-microsoft-erzwingt-upgrade-auf-windows-11-25h2/</loc>
		<lastmod>2025-11-14T11:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-passwords-kill-them-in-the-flow-keep-them-in-the-constitution/</loc>
		<lastmod>2025-11-14T11:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fighting-ai-with-ai-adversarial-bots-vs-autonomous-threat-hunters/</loc>
		<lastmod>2025-11-14T11:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-passwords-kill-them-in-the-flow-keep-them-in-the-constitution-2/</loc>
		<lastmod>2025-11-14T12:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-retail-sector-needs-a-cybersecurity-talent-incubator/</loc>
		<lastmod>2025-11-14T12:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fighting-ai-with-ai-adversarial-bots-vs-autonomous-threat-hunters-2/</loc>
		<lastmod>2025-11-14T12:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mi5-made-multiple-applications-for-phone-data-to-identify-bbc-journalists-sources/</loc>
		<lastmod>2025-11-14T12:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-of-multi-stage-phishing-kits-leveraging-telegram-for-credential-theft-and-evasion-techniques/</loc>
		<lastmod>2025-11-14T12:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-retail-sector-needs-a-cybersecurity-talent-incubator-2/</loc>
		<lastmod>2025-11-14T12:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kraken-ransomware-targets-windows-linux-and-vmware-esxi-in-enterprise-environments/</loc>
		<lastmod>2025-11-14T12:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomwares-fragmentation-reaches-a-breaking-point-while-lockbit-returns/</loc>
		<lastmod>2025-11-14T12:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-haul-surpasses-244m-in-illicit-proceeds/</loc>
		<lastmod>2025-11-14T12:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kraken-ransomware-targets-windows-linux-and-vmware-esxi-in-enterprise-environments-2/</loc>
		<lastmod>2025-11-14T12:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gastkonten-stellen-keine-optimierte-partnerintegration-dar-active-directory-und-entra-id-effizient-fur-externe-identitaten-nutzen/</loc>
		<lastmod>2025-11-14T12:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomwares-fragmentation-reaches-a-breaking-point-while-lockbit-returns-2/</loc>
		<lastmod>2025-11-14T12:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous/</loc>
		<lastmod>2025-11-14T12:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copy-paste-vulnerability-hits-ai-inference-frameworks-at-meta-nvidia-and-microsoft/</loc>
		<lastmod>2025-11-14T12:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-suspected-fortinet-fortiweb-zero-day-is-actively-exploited-researchers-warn/</loc>
		<lastmod>2025-11-14T13:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-backpedals-on-new-android-developer-registration-rules/</loc>
		<lastmod>2025-11-14T13:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advanced-macos-digitstealer-uses-multi-stage-attack-chain-to-evade-detection/</loc>
		<lastmod>2025-11-14T13:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous-2/</loc>
		<lastmod>2025-11-14T13:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copy-paste-vulnerability-hits-ai-inference-frameworks-at-meta-nvidia-and-microsoft-2/</loc>
		<lastmod>2025-11-14T13:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/formbook-malware-campaign-uses-malicious-zip-files-and-layered-scripting-techniques/</loc>
		<lastmod>2025-11-14T13:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-automate-cyber-attacks-with-ai-powered-claude-code/</loc>
		<lastmod>2025-11-14T13:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-bekommt-mehr-aufsichtsbefugnisse-bundestag-verabschiedet-nis-2/</loc>
		<lastmod>2025-11-14T13:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fur-cybercrime-forschung-dienstleister-spendet-von-hackern-gefordertes-losegeld/</loc>
		<lastmod>2025-11-14T13:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modern-authentication-for-umbraco-add-sso-scim-compliance-with-ssojet/</loc>
		<lastmod>2025-11-14T14:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundestag-beschliest-nis2-umsetzung/</loc>
		<lastmod>2025-11-14T14:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-cisco-unified-ccx-vulnerabilities-enable-arbitrary-command-execution-by-attackers/</loc>
		<lastmod>2025-11-14T14:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roningloader-uses-signed-drivers-to-disable-microsoft-defender-and-bypass-edr/</loc>
		<lastmod>2025-11-14T14:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/easydmarc-integrates-with-splunk/</loc>
		<lastmod>2025-11-14T14:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortiweb-flaw-under-attack-allowing-complete-compromise/</loc>
		<lastmod>2025-11-14T14:05:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-rogue-mcp-server-to-inject-malicious-code-into-cursors-built-in-browser/</loc>
		<lastmod>2025-11-14T14:06:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/easydmarc-integrates-with-splunk-2/</loc>
		<lastmod>2025-11-14T14:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trustmarque-ceo-outlines-ambitions-after-ultima-merger/</loc>
		<lastmod>2025-11-14T14:13:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-use-fake-invoices-to-deploy-xworm-and-steal-login-credentials/</loc>
		<lastmod>2025-11-14T14:13:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-slides-to-loss-of-almost-500m-after-cyber-attack/</loc>
		<lastmod>2025-11-14T14:14:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trustmarque-ceo-outlines-ambitions-after-ultima-merger-2/</loc>
		<lastmod>2025-11-14T14:14:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-cyberangriff-zahlungsdienstleister-trickst-hacker-mit-einer-spende-aus/</loc>
		<lastmod>2025-11-14T14:15:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-use-fake-invoices-to-deploy-xworm-and-steal-login-credentials-2/</loc>
		<lastmod>2025-11-14T14:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-nemo-flaw-enables-code-injection-and-privilege-escalation-attacks/</loc>
		<lastmod>2025-11-14T14:15:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trustmarque-ceo-outlines-ambitions-after-ultima-merger-3/</loc>
		<lastmod>2025-11-14T14:15:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-slides-to-loss-of-almost-500m-after-cyber-attack-2/</loc>
		<lastmod>2025-11-14T14:15:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-use-fake-invoices-to-deploy-xworm-and-steal-login-credentials-3/</loc>
		<lastmod>2025-11-14T14:16:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claude-ai-used-by-chinese-back-hackers-in-spy-campaign/</loc>
		<lastmod>2025-11-14T14:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-best-vibe-coding-tools-and-editors-to-use-in-2026/</loc>
		<lastmod>2025-11-14T14:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cybersecurity-jobs-are-likely-to-resist-ai-layoff-pressures-experts/</loc>
		<lastmod>2025-11-14T14:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-china-based-hackers-used-claude-to-automate-global-cyberattack/</loc>
		<lastmod>2025-11-14T15:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-catalyst-center-vulnerability-allows-attackers-to-escalate-privileges/</loc>
		<lastmod>2025-11-14T15:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claude-ai-used-by-chinese-back-hackers-in-spy-campaign-2/</loc>
		<lastmod>2025-11-14T15:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisos-can-best-work-with-ceos-and-the-board-lessons-from-the-field/</loc>
		<lastmod>2025-11-14T15:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-refresh-your-akira-defenses-now-cisa-says-as-owasp-revamps-its-app-sec-top-10-risks/</loc>
		<lastmod>2025-11-14T15:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-refresh-your-akira-defenses-now-cisa-says-as-owasp-revamps-its-app-sec-top-10-risks-2/</loc>
		<lastmod>2025-11-14T16:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-add-passwordless-authentication-to-umbraco-using-mojoauth/</loc>
		<lastmod>2025-11-14T16:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-error-the-1-cause-of-security-incidents/</loc>
		<lastmod>2025-11-14T16:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-russian-hacker-reportedly-detained-in-thailand-faces-possible-us-extradition/</loc>
		<lastmod>2025-11-14T16:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-imminent-threat-as-akira-ransomware-starts-hitting-nutanix-ahv/</loc>
		<lastmod>2025-11-14T16:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-viability-called-into-question-by-reported-inference-spending-with-microsoft/</loc>
		<lastmod>2025-11-14T16:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-tech-firm-leak-reportedly-exposes-state-linked-hacking/</loc>
		<lastmod>2025-11-14T16:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-sites-at-risk-from-imunify360-critical-flaw-exploit/</loc>
		<lastmod>2025-11-14T16:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-viability-called-into-question-by-reported-inference-spending-with-microsoft-2/</loc>
		<lastmod>2025-11-14T16:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-we-in-the-quantum-decade/</loc>
		<lastmod>2025-11-14T16:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-cyber-spies-used-claude-ai-to-automate-90-of-their-attack-campaign-anthropic-claims/</loc>
		<lastmod>2025-11-14T16:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-tech-firm-leak-reportedly-exposes-state-linked-hacking-2/</loc>
		<lastmod>2025-11-14T16:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-announces-new-strike-force-targeting-chinese-crypto-scammers/</loc>
		<lastmod>2025-11-14T16:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-serious-ai-bugs-exposing-meta-nvidia-and-microsoft-inference-frameworks/</loc>
		<lastmod>2025-11-14T16:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-launch-spearspecter-spy-operation-on-defense-government-targets/</loc>
		<lastmod>2025-11-14T16:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-announces-new-strike-force-targeting-chinese-crypto-scammers-2/</loc>
		<lastmod>2025-11-14T16:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-best-platforms-for-enterprise-cyber-risk-management/</loc>
		<lastmod>2025-11-14T16:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-humans-in-an-ai-powered-world/</loc>
		<lastmod>2025-11-14T16:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/western-governments-disrupt-trifecta-of-cybercrime-tools/</loc>
		<lastmod>2025-11-14T17:00:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arista-palo-alto-bolster-ai-data-center-security/</loc>
		<lastmod>2025-11-14T17:00:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-best-platforms-for-enterprise-cyber-risk-management-2/</loc>
		<lastmod>2025-11-14T17:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-russian-port-operator-aimed-to-disrupt-coal-fertilizer-shipments/</loc>
		<lastmod>2025-11-14T17:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-researchers-see-signs-that-lighthouse-text-scammers-disrupted-after-lawsuit/</loc>
		<lastmod>2025-11-14T17:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-stemmt-sich-gegen-die-forderung-millionen-von-chatgpt-konversationen-freizugeben/</loc>
		<lastmod>2025-11-14T17:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-flags-scam-targeting-chinese-speakers-with-bogus-surgery-bills/</loc>
		<lastmod>2025-11-14T17:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-state-hackers-jailbroke-claude-ai-code-for-automated-breaches/</loc>
		<lastmod>2025-11-14T17:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-cyber-attack-costs-firm-485m-in-the-quarter/</loc>
		<lastmod>2025-11-14T17:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-researchers-see-signs-that-lighthouse-text-scammers-disrupted-after-lawsuit-2/</loc>
		<lastmod>2025-11-14T17:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/northrop-grumman-ford-prep-ai-infrastructure-with-openshift/</loc>
		<lastmod>2025-11-14T17:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkout-com-snubs-hackers-after-data-breach-to-donate-ransom-instead/</loc>
		<lastmod>2025-11-14T17:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/northrop-grumman-ford-prep-ai-infrastructure-with-openshift-2/</loc>
		<lastmod>2025-11-14T17:04:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-cyberangriff-zahlungsdienstleister-wischt-hackern-mittels-spende-eins-aus/</loc>
		<lastmod>2025-11-14T17:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkout-com-snubs-hackers-after-data-breach-to-donate-ransom-instead-2/</loc>
		<lastmod>2025-11-14T17:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-warns-state-linked-actor-abused-its-ai-tool-in-sophisticated-espionage-campaign/</loc>
		<lastmod>2025-11-14T18:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/civil-society-decries-digital-rights-rollback-as-european-commission-pushes-data-protection-changes/</loc>
		<lastmod>2025-11-14T18:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-people-plead-guilty-to-helping-north-koreans-infiltrate-us-companies-as-remote-it-workers/</loc>
		<lastmod>2025-11-14T18:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unified-sase-as-a-service-2-0/</loc>
		<lastmod>2025-11-14T18:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-studios-fuhrt-trainingsinhalte-fur-branchenfuhrende-schulungen-zusammen-2/</loc>
		<lastmod>2025-11-14T18:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-silent-patch-for-fortiweb-zero-day-exploited-in-attacks/</loc>
		<lastmod>2025-11-14T18:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-governance-and-administration-app-proliferation-and-the-app-integration-chasm/</loc>
		<lastmod>2025-11-14T18:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-firm-claims-it-stopped-chinese-state-sponsored-cyber-attack-campaign/</loc>
		<lastmod>2025-11-14T18:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scharfe-kritik-am-bayernvertrag-bayern-plant-milliarden-deal-mit-microsoft/</loc>
		<lastmod>2025-11-14T18:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-silent-patch-for-fortiweb-zero-day-exploited-in-attacks-2/</loc>
		<lastmod>2025-11-14T18:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handelsverband-deutschland-merz-will-chinesische-6g-ausrustung-nicht-zulassen/</loc>
		<lastmod>2025-11-14T18:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trojan-prompt-how-genai-is-turning-staff-into-unwitting-insider-threats/</loc>
		<lastmod>2025-11-14T19:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tdl-009-inside-dns-threat-intelligence-privacy-security-innovation/</loc>
		<lastmod>2025-11-14T19:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-key-security-7-enterprise-proven-methods-to-prevent-costly-data-breaches/</loc>
		<lastmod>2025-11-14T19:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-state-hackers-used-anthropic-ai-systems-in-dozens-of-attacks/</loc>
		<lastmod>2025-11-14T19:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trojan-prompt-how-genai-is-turning-staff-into-unwitting-insider-threats-2/</loc>
		<lastmod>2025-11-14T19:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crims-poison-150k-npm-packages-with-token-farming-malware/</loc>
		<lastmod>2025-11-14T19:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-active-attacks-on-cisco-asa-and-firepower-flaws/</loc>
		<lastmod>2025-11-14T19:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-first-ai-driven-cyber-espionage-campaign/</loc>
		<lastmod>2025-11-14T19:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-unveils-secure-secrets-management-in-visual-studio-code/</loc>
		<lastmod>2025-11-14T19:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claims-of-claude-ai-automated-cyberattacks-met-with-doubt/</loc>
		<lastmod>2025-11-14T19:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-active-attacks-on-cisco-asa-and-firepower-flaws-2/</loc>
		<lastmod>2025-11-14T19:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-first-ai-driven-cyber-espionage-campaign-2/</loc>
		<lastmod>2025-11-14T19:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-turn-json-services-into-covert-malware-delivery-channels/</loc>
		<lastmod>2025-11-14T19:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-unveils-secure-secrets-management-in-visual-studio-code-2/</loc>
		<lastmod>2025-11-14T19:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-emperor-palpatine/</loc>
		<lastmod>2025-11-14T20:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-heimdall-towards-risk-aware-network-management-outsourcing/</loc>
		<lastmod>2025-11-14T20:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-autonomous-ai-powered-hacking-campaign-still-required-a-ton-of-human-work/</loc>
		<lastmod>2025-11-14T20:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cve-2025-59367-flaw-lets-hackers-access-asus-dsl-routers-remotely/</loc>
		<lastmod>2025-11-14T20:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-what-comes-next-after-us-government-shutdown/</loc>
		<lastmod>2025-11-14T20:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-program-gives-aws-exec-new-security-lens/</loc>
		<lastmod>2025-11-14T20:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cross-training-can-give-security-professionals-the-soft-skills-they-need/</loc>
		<lastmod>2025-11-14T21:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-compromises-legacy-cloud-storage-system-of-checkout-com/</loc>
		<lastmod>2025-11-14T21:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-destructive-sandworm-adversary/</loc>
		<lastmod>2025-11-14T21:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-us-citizens-plead-guilty-to-helping-north-korean-it-workers-earn-2-million/</loc>
		<lastmod>2025-11-14T21:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-lauds-series-of-gains-against-north-korean-it-worker-scheme-crypto-thefts/</loc>
		<lastmod>2025-11-14T21:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-finally-cops-to-critical-makeadmin-bug-under-active-exploitation/</loc>
		<lastmod>2025-11-14T21:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imunify360-zero-day-leaves-millions-of-websites-open-to-rce/</loc>
		<lastmod>2025-11-14T21:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-issued-seizure-warrant-to-starlink-over-satellite-internet-systems-used-at-scam-compound/</loc>
		<lastmod>2025-11-14T21:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hardened-containers-look-to-eliminate-common-source-of-vulnerabilities/</loc>
		<lastmod>2025-11-14T21:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/150000-packages-flood-npm-registry-in-token-farming-campaign/</loc>
		<lastmod>2025-11-14T21:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-operators-of-lighthouse-smishing-campaign/</loc>
		<lastmod>2025-11-14T21:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/document-tech-firm-hit-as-new-cyber-gang-expands-reach/</loc>
		<lastmod>2025-11-14T21:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortiweb-flaw-actively-exploited-to-create-rogue-admin-accounts/</loc>
		<lastmod>2025-11-14T22:00:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-security-tools-target-growing-macos-threats/</loc>
		<lastmod>2025-11-14T22:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sues-operators-of-lighthouse-smishing-campaign-2/</loc>
		<lastmod>2025-11-14T22:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-tool-ran-bulk-of-cyberattack-anthropic-says/</loc>
		<lastmod>2025-11-14T22:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cl0p-claims-ransomware-hit-on-nhs/</loc>
		<lastmod>2025-11-14T22:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logitech-confirms-data-breach-after-clop-extortion-attack/</loc>
		<lastmod>2025-11-14T22:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/</loc>
		<lastmod>2025-11-14T23:00:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-raas-targets-nutanix-vms-threatens-critical-orgs/</loc>
		<lastmod>2025-11-14T23:00:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/learning-sales-skills-can-make-security-professionals-more-effective/</loc>
		<lastmod>2025-11-14T23:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deriving-value-from-enhanced-nhi-security-protocols/</loc>
		<lastmod>2025-11-14T23:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/which-technologies-keep-ai-driven-security-ahead-of-threats/</loc>
		<lastmod>2025-11-14T23:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-best-practices-for-non-human-identity-security/</loc>
		<lastmod>2025-11-15T00:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-enhance-cybersecurity-measures/</loc>
		<lastmod>2025-11-15T00:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deriving-value-from-enhanced-nhi-security-protocols-2/</loc>
		<lastmod>2025-11-15T00:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/which-technologies-keep-ai-driven-security-ahead-of-threats-2/</loc>
		<lastmod>2025-11-15T00:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-detection-to-response-why-confidence-is-the-real-game-changer/</loc>
		<lastmod>2025-11-15T00:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-best-practices-for-non-human-identity-security-2/</loc>
		<lastmod>2025-11-15T00:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-soc-efficiency-is-the-most-valuable-currency-in-cybersecurity/</loc>
		<lastmod>2025-11-15T00:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-network-visibility-is-the-thread-that-holds-cybersecurity-together/</loc>
		<lastmod>2025-11-15T00:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-shadow-it-leaves-every-industry-in-the-dark/</loc>
		<lastmod>2025-11-15T00:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-soc-efficiency-is-the-most-valuable-currency-in-cybersecurity-2/</loc>
		<lastmod>2025-11-15T00:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-network-visibility-is-the-thread-that-holds-cybersecurity-together-2/</loc>
		<lastmod>2025-11-15T00:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisumsetzung-uberfallig-uneinheitlich-und-mit-begrenzter-wirkungsmachtigkeit/</loc>
		<lastmod>2025-11-15T00:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logistik-cybersicherheit-ruckt-ins-zentrum-strategischer-entscheidungen/</loc>
		<lastmod>2025-11-15T00:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-shadow-it-leaves-every-industry-in-the-dark-2/</loc>
		<lastmod>2025-11-15T00:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-continues-crackdown-on-north-koreas-cyber-schemes/</loc>
		<lastmod>2025-11-15T00:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-we-cant-expect-meta-to-stop-online-scams-on-its-own/</loc>
		<lastmod>2025-11-15T00:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-faces-financial-hit-lawsuits-from-breach-affecting-10-5-million/</loc>
		<lastmod>2025-11-15T04:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-the-discriminative-power-of-cross-layer-rtts-in-fingerprinting-proxy-traffic/</loc>
		<lastmod>2025-11-15T04:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-betrug-scams-und-datendiebstahl-massive-sicherheitslucken/</loc>
		<lastmod>2025-11-15T04:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worm-flooding-npm-registry-with-token-stealers-still-isnt-under-control/</loc>
		<lastmod>2025-11-15T05:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-faces-financial-hit-lawsuits-from-breach-affecting-10-5-million-2/</loc>
		<lastmod>2025-11-15T05:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verlasslicher-betrieb-von-it-systemen-best-practices-fur-netzwerk-monitoring-und-alarmierung/</loc>
		<lastmod>2025-11-15T05:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/txone-bedrohungsanalyse-1h-2025-ransomware-dominiert-ot-angriffe/</loc>
		<lastmod>2025-11-15T08:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-von-typosquatting-bis-dga-dns-betrug-wirksam-bekampfen/</loc>
		<lastmod>2025-11-15T09:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fakeshop-betrug-14-millionen-euro-ergaunert-duo-landet-hinter-gittern/</loc>
		<lastmod>2025-11-15T11:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-major-leak-spills-a-chinese-hacking-contractors-tools-and-targets/</loc>
		<lastmod>2025-11-15T11:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-u-s-citizens-plead-guilty-to-helping-north-korean-it-workers-infiltrate-136-companies/</loc>
		<lastmod>2025-11-15T11:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fedramp-deviation-requests-when-and-how-to-submit/</loc>
		<lastmod>2025-11-15T12:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-plead-guilty-in-u-s-for-helping-north-korean-it-workers-infiltrate-136-companies/</loc>
		<lastmod>2025-11-15T13:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kunden-und-mitarbeiterdaten-von-logitech-gehackt/</loc>
		<lastmod>2025-11-15T13:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-exploits-unpatched-xwiki-servers-to-pull-more-devices-into-its-botnet/</loc>
		<lastmod>2025-11-15T16:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-cyberattack-cost-the-company-over-220-million/</loc>
		<lastmod>2025-11-15T17:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-hit-by-data-breach-after-an-employee-falls-for-social-engineering-scam/</loc>
		<lastmod>2025-11-15T18:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-single-bug-in-mobile-apps-can-cost-you-millions-protect-with-secure-code-review/</loc>
		<lastmod>2025-11-15T19:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/desaster-fortinet-fortiweb-schwachstelle-cve-2025-64446/</loc>
		<lastmod>2025-11-15T19:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-tribunal-says-reselling-microsoft-licenses-is-a-ok/</loc>
		<lastmod>2025-11-15T19:59:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/</loc>
		<lastmod>2025-11-15T20:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-mineshark-cryptomining-traffic-detection-at-scale/</loc>
		<lastmod>2025-11-15T21:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-10-kb5068781-esu-update-may-fail-with-0x800f0922-errors/</loc>
		<lastmod>2025-11-15T21:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/level-up-your-solidity-llm-tooling-with-slither-mcp/</loc>
		<lastmod>2025-11-15T22:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-vulnerabilities-in-gosign-desktop-lead-to-remote-code-execution/</loc>
		<lastmod>2025-11-15T22:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-impact-does-agentic-ai-have-on-cloud-native-security/</loc>
		<lastmod>2025-11-15T23:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-agentic-ai-critical-for-future-cybersecurity/</loc>
		<lastmod>2025-11-15T23:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-you-scale-non-human-identity-management-safely/</loc>
		<lastmod>2025-11-15T23:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-secrets-management-contribute-to-compliance/</loc>
		<lastmod>2025-11-16T00:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrial-ai-ki-als-wegbereiter-der-industriellen-zukunft/</loc>
		<lastmod>2025-11-16T00:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-impact-does-agentic-ai-have-on-cloud-native-security-2/</loc>
		<lastmod>2025-11-16T00:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisherausforderung-deutscher-mittelstand-im-spannungsfeld-zwischen-eigenwahrnehmung-und-bedrohungslage/</loc>
		<lastmod>2025-11-16T00:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hessischer-datenschutzer-office-365-kann-dsgvo-konform-eingesetzt-werden/</loc>
		<lastmod>2025-11-16T00:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/atlas-browser-der-erste-schritt-zum-ki-betriebssystem/</loc>
		<lastmod>2025-11-16T00:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retro-games-opens-pre-orders-for-thea1200-a-full-size-working-amiga-replica/</loc>
		<lastmod>2025-11-16T04:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/42-der-unternehmen-verlieren-umsatz-durch-it-probleme-grose-hoffnung-auf-ki/</loc>
		<lastmod>2025-11-16T05:59:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-hole-in-ai-guardrails-by-using-strings-like-coffee/</loc>
		<lastmod>2025-11-16T05:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robuste-informationssicherheit-und-durchgangige-compliance/</loc>
		<lastmod>2025-11-16T07:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-kommt-wie-ist-die-sicherheitslage-im-mittelstand/</loc>
		<lastmod>2025-11-16T07:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-china-backed-hackers-launch-first-large-scale-autonomous-ai-cyberattack/</loc>
		<lastmod>2025-11-16T08:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-windows-kernel-flaw-patched-suspected-fortinet-fortiweb-zero-day-exploited/</loc>
		<lastmod>2025-11-16T09:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sans-institute-startet-sicherheitstraining-fur-entwickler/</loc>
		<lastmod>2025-11-16T09:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-ais-fortune-teller-effect-why-its-all-too-easy-to-mistake-pattern-mastery-for-wisdom/</loc>
		<lastmod>2025-11-16T12:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-you-future-proof-your-life-in-the-age-of-ai-book-review/</loc>
		<lastmod>2025-11-16T13:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-ausfall-zeigt-datensicherheit-braucht-eine-stabile-backup-strategie/</loc>
		<lastmod>2025-11-16T13:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/memory-boom-bust-cycle-booms-again-as-samsung-reportedly-jacks-memory-prices-60/</loc>
		<lastmod>2025-11-16T16:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-magmaw-modality-agnostic-adversarial-attacks/</loc>
		<lastmod>2025-11-16T17:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-71/</loc>
		<lastmod>2025-11-16T17:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-550-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-11-16T17:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-to-flag-android-apps-with-excessive-battery-use-on-the-play-store/</loc>
		<lastmod>2025-11-16T17:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-uses-courts-congress-to-counter-massive-smishing-campaign/</loc>
		<lastmod>2025-11-16T18:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-admit-helping-north-korea-evade-sanctions-through-it-worker-schemes/</loc>
		<lastmod>2025-11-16T22:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zuspitzung-der-energiekrise-fur-rechenzentren-gefahrdet-digitalstandort-deutschland/</loc>
		<lastmod>2025-11-16T23:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-contagious-interview-apt-uses-json-keeper-and-gitlab-to-deliver-beavertail-spyware/</loc>
		<lastmod>2025-11-17T00:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drohnen-erkennung-und-lokalisierung-mittels-intelligenter-sensordatenfusion/</loc>
		<lastmod>2025-11-17T00:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-the-most-popular-single-sign-on-options/</loc>
		<lastmod>2025-11-17T04:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-flach-zu-segmentiert-sicherheit-in-der-k8s-umgebung/</loc>
		<lastmod>2025-11-17T04:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widerstandsfahigkeit-fur-saas-umgebungen-backup-als-strategischen-resilienzfaktor/</loc>
		<lastmod>2025-11-17T04:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aipac-discloses-data-breach-says-hundreds-affected/</loc>
		<lastmod>2025-11-17T04:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-i-ensure-my-agentic-ai-systems-are-safe/</loc>
		<lastmod>2025-11-17T05:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-tools-empower-better-secrets-security-management/</loc>
		<lastmod>2025-11-17T05:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-proactive-should-your-secrets-rotation-strategy-be/</loc>
		<lastmod>2025-11-17T05:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-nhidr-technologies-fully-protect-my-cloud-data/</loc>
		<lastmod>2025-11-17T05:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australia-lags-regional-peers-in-ai-adoption/</loc>
		<lastmod>2025-11-17T06:00:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-year-ahead-in-cyber-whats-next-for-cybersecurity-in-2026/</loc>
		<lastmod>2025-11-17T06:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-next-tech-divide-is-written-in-ai-diffusion/</loc>
		<lastmod>2025-11-17T06:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iso-and-isms-9-reasons-security-certifications-go-wrong/</loc>
		<lastmod>2025-11-17T06:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spam-flooding-npm-registry-with-token-stealers-still-isnt-under-control/</loc>
		<lastmod>2025-11-17T06:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strix-open-source-ai-agents-for-penetration-testing/</loc>
		<lastmod>2025-11-17T06:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-secalerts-relevant-actionable-upthe-minute-vulnerability-alerts/</loc>
		<lastmod>2025-11-17T07:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-schliest-kritische-sicherheitslucken-apple-schliest-uber-50-schwachstellen-mit-ios-26-1/</loc>
		<lastmod>2025-11-17T07:00:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-the-limitations-of-passkeys/</loc>
		<lastmod>2025-11-17T07:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-the-chief-trust-officer-where-does-the-ciso-fit/</loc>
		<lastmod>2025-11-17T07:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-tech-that-turns-supply-chains-from-brittle-to-unbreakable/</loc>
		<lastmod>2025-11-17T07:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-for-2025-whats-new-and-why-it-matters/</loc>
		<lastmod>2025-11-17T08:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rust-adoption-drives-android-memory-safety-bugs-below-20-for-first-time/</loc>
		<lastmod>2025-11-17T08:00:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparenz-als-sicherheitsfaktor-2-it-doku-bringen-sicherheit-durch-klarheit/</loc>
		<lastmod>2025-11-17T08:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widerstandsfahigkeit-fur-saas-umgebungen-backup-als-strategischer-resilienzfaktor/</loc>
		<lastmod>2025-11-17T08:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gipfel-in-berlin-europa-strebt-digitale-souveranitat-an/</loc>
		<lastmod>2025-11-17T08:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-expands-botnet-by-exploiting-xwiki-rce-bug-left-unpatched-since-february-2025/</loc>
		<lastmod>2025-11-17T09:00:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsrisiken-durch-abhangigkeit-trump-strafzolle-datenrisiken-wo-bleibt-europas-digitale-souveranitat/</loc>
		<lastmod>2025-11-17T09:00:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-networks-erklart-moderne-sicherheitsstrategien-fur-k8s-umgebungen/</loc>
		<lastmod>2025-11-17T09:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widerstandsfahigkeit-fur-saas-umgebungen-backup-als-strategischer-resilienzfaktor-2/</loc>
		<lastmod>2025-11-17T09:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moglicher-cyberangriff-bundestagsabgeordnete-erhalten-verdachtige-usb-sticks/</loc>
		<lastmod>2025-11-17T09:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-cloud-ddos-protection-service-cloud-dps-detected-and-mitigated-an-800g-ddos-attack-towards-a-critical-infrastructure-operator/</loc>
		<lastmod>2025-11-17T09:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-new-15-mini-app-deal-finally-gets-tencent-to-cut-cupertino-in/</loc>
		<lastmod>2025-11-17T09:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attack-costs-carmaker-jlr-258m-in-q2/</loc>
		<lastmod>2025-11-17T09:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fehler-0x800f0922-erstes-esu-update-fur-windows-10-macht-probleme/</loc>
		<lastmod>2025-11-17T10:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jwt-governance-for-soc-2-iso-27001-and-gdpr-a-complete-guide/</loc>
		<lastmod>2025-11-17T10:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-dynamic-endpoint-security-is-redefining-trust/</loc>
		<lastmod>2025-11-17T10:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-braucht-resilienz-ki-als-schutzschild-fur-die-energieversorgung/</loc>
		<lastmod>2025-11-17T10:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-veroffentlicht-ransomware-report-fur-q3-2025/</loc>
		<lastmod>2025-11-17T10:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-threat-actors-use-json-sites-to-deliver-malware-via-trojanized-code/</loc>
		<lastmod>2025-11-17T11:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-plead-guilty-in-north-korean-it-worker-fraud-scheme/</loc>
		<lastmod>2025-11-17T11:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/summit-on-european-digital-sovereignty-europa-strebt-digitale-souveranitat-an/</loc>
		<lastmod>2025-11-17T12:00:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technisch-uberprufbare-digitale-souveranitat-souverane-microsoft-cloud-fur-europa-kontrolle-compliance-konfiguration/</loc>
		<lastmod>2025-11-17T12:00:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-cyberattacke-verursacht-direkte-kosten-von-222-mio-euro/</loc>
		<lastmod>2025-11-17T12:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-threat-actors-use-json-sites-to-deliver-malware-via-trojanized-code-2/</loc>
		<lastmod>2025-11-17T12:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/messenger-telegram-stellt-neuen-blockade-rekord-auf/</loc>
		<lastmod>2025-11-17T12:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fehler-0x800f0922-november-update-fur-windows-10-macht-probleme/</loc>
		<lastmod>2025-11-17T12:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-expands-to-nutanix-ahv-raising-stakes-for-enterprise-security/</loc>
		<lastmod>2025-11-17T12:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-job-test-trap-upgrades-to-json-malware-dropboxes/</loc>
		<lastmod>2025-11-17T13:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indias-new-data-privacy-rules-turn-privacy-compliance-into-an-engineering-challenge/</loc>
		<lastmod>2025-11-17T13:00:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-expands-to-nutanix-ahv-raising-stakes-for-enterprise-security-2/</loc>
		<lastmod>2025-11-17T13:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mullvad-obfuscation-verschleiert-wireguard-nun-noch-besser/</loc>
		<lastmod>2025-11-17T13:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-gnadenfrist-von-nis2-lauft-ab/</loc>
		<lastmod>2025-11-17T13:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-job-test-trap-upgrades-to-json-malware-dropboxes-2/</loc>
		<lastmod>2025-11-17T13:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-prosecutors-seize-4-11m-in-crypto-from-twitter-mega-hack-culprit/</loc>
		<lastmod>2025-11-17T13:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragon-breath-uses-roningloader-to-disable-security-tools-and-deploy-gh0st-rat/</loc>
		<lastmod>2025-11-17T13:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-gives-federal-agencies-one-week-to-patch-exploited-fortinet-bug/</loc>
		<lastmod>2025-11-17T14:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-leaves-jaguar-land-rover-short-of-680-million/</loc>
		<lastmod>2025-11-17T14:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surveillance-tech-provider-protei-was-hacked-its-data-stolen-and-its-website-defaced/</loc>
		<lastmod>2025-11-17T14:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurofiber-admits-crooks-swiped-data-from-french-unit-after-cyberattack/</loc>
		<lastmod>2025-11-17T14:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/echogram-flaw-bypasses-guardrails-in-major-llms/</loc>
		<lastmod>2025-11-17T14:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-men-admit-helping-north-korean-it-workers-infiltrate-us-companies/</loc>
		<lastmod>2025-11-17T14:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-internet-isnt-free-shutdowns-surveillance-and-algorithmic-risks/</loc>
		<lastmod>2025-11-17T14:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evaluation-campaign-using-clickfix-technique-to-deploy-amatera-stealer-and-netsupport-rat/</loc>
		<lastmod>2025-11-17T14:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-aix-flaw-allows-remote-attackers-to-run-arbitrary-commands/</loc>
		<lastmod>2025-11-17T14:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-rce-flaws-in-ai-inference-engines-expose-meta-nvidia-and-microsoft-frameworks/</loc>
		<lastmod>2025-11-17T14:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-spearspecter-campaign-leveraging-personalized-social-engineering-against-high-value-officials/</loc>
		<lastmod>2025-11-17T14:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alice-blue-partners-with-accuknox-for-regulatory-compliance/</loc>
		<lastmod>2025-11-17T14:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-breach-136-u-s-companies-earning-2-2-million/</loc>
		<lastmod>2025-11-17T14:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-detection-methods-uncovered-for-outlook-notdoor-backdoor-malware/</loc>
		<lastmod>2025-11-17T14:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-spearspecter-campaign-leveraging-personalized-social-engineering-against-high-value-officials-2/</loc>
		<lastmod>2025-11-17T14:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-weaponize-xwiki-flaw-to-build-and-rent-out-botnet-networks/</loc>
		<lastmod>2025-11-17T14:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alice-blue-partners-with-accuknox-for-regulatory-compliance-2/</loc>
		<lastmod>2025-11-17T14:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortiweb-waf-flaw-actively-exploited-to-establish-admin-access-and-seize-total-control/</loc>
		<lastmod>2025-11-17T14:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fortinet-exploited-chinas-ai-hacks-phaas-empire-falls-more/</loc>
		<lastmod>2025-11-17T14:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-reasons-why-attackers-are-phishing-over-linkedin-3/</loc>
		<lastmod>2025-11-17T14:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beteiligung-nvidia-will-mit-nokia-us-fuhrung-bei-6g-durchsetzen/</loc>
		<lastmod>2025-11-17T14:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-ai-agent-security-startup-runlayer-launches-with-8-unicorns-11m-from-khoslas-keith-rabois-and-felicis/</loc>
		<lastmod>2025-11-17T14:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-verantwortung-der-cisos-wachst/</loc>
		<lastmod>2025-11-17T14:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frentree-partners-with-accuknox-to-expand-zero-trust-cnapp-security-in-south-korea/</loc>
		<lastmod>2025-11-17T15:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-hit-by-cybersecurity-breach-millions-of-users-potentially-exposed/</loc>
		<lastmod>2025-11-17T15:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-compromise-to-control-an-msp-guide-to-account-takeovers/</loc>
		<lastmod>2025-11-17T16:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fixing-vulnerabilities-directly-in-your-ide-with-escape-mcp/</loc>
		<lastmod>2025-11-17T16:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-kriminalitat-wenn-der-betrug-auf-autopilot-lauft/</loc>
		<lastmod>2025-11-17T16:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-confirms-data-breach-impacting-users-phone-numbers-and-physical-addresses/</loc>
		<lastmod>2025-11-17T16:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uber-500-neue-opfer-von-ransomware-pro-monat/</loc>
		<lastmod>2025-11-17T16:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/game-over-europol-storms-gaming-platforms-in-extremist-content-sweep/</loc>
		<lastmod>2025-11-17T16:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overconfidence-is-the-new-zero-day-as-teams-stumble-through-cyber-simulations/</loc>
		<lastmod>2025-11-17T16:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/server-virtualization-market-heats-up-as-vmware-rivals-try-to-create-alluring-alternatives/</loc>
		<lastmod>2025-11-17T16:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-confirms-major-disruption-and-196m-cost-from-september-cyberattack/</loc>
		<lastmod>2025-11-17T16:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-human-perimeter-how-the-com-became-a-cybercrime-powerhouse/</loc>
		<lastmod>2025-11-17T16:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logitech-confirms-data-breach/</loc>
		<lastmod>2025-11-17T16:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-bug-blocks-microsoft-365-desktop-app-installs/</loc>
		<lastmod>2025-11-17T16:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-human-perimeter-how-the-com-became-a-cybercrime-powerhouse-2/</loc>
		<lastmod>2025-11-17T16:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-readiness-stalls-despite-confidence-in-incident-response/</loc>
		<lastmod>2025-11-17T16:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-eurostack-als-europaische-digitalstrategie-so-konnte-europas-digitale-souveranitat-konkret-aussehen/</loc>
		<lastmod>2025-11-17T16:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-pay-is-on-the-rise-even-as-security-budgets-tighten/</loc>
		<lastmod>2025-11-17T17:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-engaged-in-ransomware-attacks-against-critical-sectors/</loc>
		<lastmod>2025-11-17T17:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pennsylvania-ag-confirms-data-breach-after-inc-ransom-attack/</loc>
		<lastmod>2025-11-17T17:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-email-spoofing-vulnerability-sparks-messy-disclosure-dispute/</loc>
		<lastmod>2025-11-17T17:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/golem-karrierewelt-kostenloses-live-webinar-ki-agents-in-sharepoint-nutzen/</loc>
		<lastmod>2025-11-17T17:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-pay-is-on-the-rise-even-as-security-budgets-tighten-2/</loc>
		<lastmod>2025-11-17T17:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-leads-takedown-of-thousands-of-extremist-gaming-links/</loc>
		<lastmod>2025-11-17T17:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-issue-paves-way-for-credential-stealing-attacks/</loc>
		<lastmod>2025-11-17T17:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-leads-takedown-of-thousands-of-extremist-gaming-links-2/</loc>
		<lastmod>2025-11-17T17:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-key-ways-attack-surface-management-will-evolve-in-2026/</loc>
		<lastmod>2025-11-17T17:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-issue-paves-way-for-credential-stealing-attacks-2/</loc>
		<lastmod>2025-11-17T17:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-findings-management-what-you-need-to-know/</loc>
		<lastmod>2025-11-17T17:05:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-chips-away-at-north-korean-it-worker-fraud-with-guilty-pleas-cryptocurrency-seizure/</loc>
		<lastmod>2025-11-17T17:12:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-polycrisis-of-ai-cyberattacks-is-approaching-are-you-breach-ready-yet/</loc>
		<lastmod>2025-11-17T18:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-data-your-model-self-serve-custom-entity-types-in-tonic-textual/</loc>
		<lastmod>2025-11-17T18:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-time-varying-bottleneck-links-in-leo-satellite-networks/</loc>
		<lastmod>2025-11-17T18:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-polycrisis-of-ai-cyberattacks-is-approaching-are-you-breach-ready-yet-2/</loc>
		<lastmod>2025-11-17T18:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/calling-all-msps-are-you-ready-for-holidaze/</loc>
		<lastmod>2025-11-17T18:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerability-in-fortinet-fortiweb-is-under-exploitation/</loc>
		<lastmod>2025-11-17T18:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-data-your-model-self-serve-custom-entity-types-in-tonic-textual-2/</loc>
		<lastmod>2025-11-17T18:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-context-matters-more-than-code-in-ai-native-product-development/</loc>
		<lastmod>2025-11-17T18:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/princeton-university-says-database-containing-donor-alumni-info-breached/</loc>
		<lastmod>2025-11-17T18:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/selling-your-identity-to-north-korean-it-scammers-isnt-a-sustainable-side-hustle/</loc>
		<lastmod>2025-11-17T18:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-context-matters-more-than-code-in-ai-native-product-development-2/</loc>
		<lastmod>2025-11-17T18:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/princeton-university-says-database-containing-donor-alumni-info-breached-2/</loc>
		<lastmod>2025-11-17T18:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-says-it-stole-data-of-millions-of-under-armour-users/</loc>
		<lastmod>2025-11-17T18:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/selling-your-identity-to-north-korean-it-scammers-isnt-a-sustainable-side-hustle-2/</loc>
		<lastmod>2025-11-17T18:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-says-it-stole-data-of-millions-of-under-armour-users-2/</loc>
		<lastmod>2025-11-17T18:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-hit-by-15-tbps-ddos-attack-using-500000-ip-addresses/</loc>
		<lastmod>2025-11-17T18:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-hit-by-15-tbps-ddos-attack-using-500000-ip-addresses-2/</loc>
		<lastmod>2025-11-17T18:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-context-matters-more-than-code-in-ai-native-product-development-3/</loc>
		<lastmod>2025-11-17T18:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-evalusion-clickfix-campaign-delivers-amatera-stealer-and-netsupport-rat/</loc>
		<lastmod>2025-11-17T18:06:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kraken-uses-benchmarking-to-enhance-ransomware-attacks/</loc>
		<lastmod>2025-11-17T18:06:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowmq-critical-ai-flaws-impact-meta-nvidia-and-more/</loc>
		<lastmod>2025-11-17T19:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/atts-177m-breach-settlement-deadline-nears-are-you-entitled-to-a-payout/</loc>
		<lastmod>2025-11-17T19:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-increase-in-adoption-of-video-surveillance-as-a-service/</loc>
		<lastmod>2025-11-17T19:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-shielding-chart/</loc>
		<lastmod>2025-11-17T18:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kamel-ghali-on-whats-theoretically-possible-in-car-hacking/</loc>
		<lastmod>2025-11-17T18:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kenyan-govt-websites-back-online-after-hackers-deface-pages-with-white-supremacist-messages/</loc>
		<lastmod>2025-11-17T18:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surveillance-tech-provider-protei-was-hacked-its-data-stolen-and-its-website-defaced-2/</loc>
		<lastmod>2025-11-17T18:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acting-on-fbi-tip-thailand-detains-suspected-russian-hacker/</loc>
		<lastmod>2025-11-17T19:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shared-intel-qa-viewing-cmmc-as-a-blueprint-for-readiness-across-the-defense-supply-chain/</loc>
		<lastmod>2025-11-17T20:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logitech-discloses-data-breach-after-clop-claims/</loc>
		<lastmod>2025-11-17T20:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-mitigated-the-largest-cloud-ddos-ever-recorded-15-7-tbps/</loc>
		<lastmod>2025-11-17T20:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/princeton-university-discloses-data-breach-affecting-donors-alumni/</loc>
		<lastmod>2025-11-17T20:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-seizes-250-servers-used-by-bulletproof-hosting-service/</loc>
		<lastmod>2025-11-17T20:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shared-intel-qa-viewing-cmmc-as-a-blueprint-for-readiness-across-the-defense-supply-chain-2/</loc>
		<lastmod>2025-11-17T20:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitaler-souveranitatsgipfel-vorteile-fur-eu-firmen-bei-it-ausschreibungen-geplant/</loc>
		<lastmod>2025-11-17T20:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pennsylvania-attorney-general-says-ssns-stolen-during-august-ransomware-attack/</loc>
		<lastmod>2025-11-17T21:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researcher-calls-bs-on-coinbase-breach-disclosure-timeline/</loc>
		<lastmod>2025-11-17T21:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-imunify360-ai-bolit-bug-fixed-in-latest-patch/</loc>
		<lastmod>2025-11-17T21:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frentree-partners-with-accuknox-to-expand-zero-trust-cnapp-security-in-south-korea-2/</loc>
		<lastmod>2025-11-17T21:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/70-million-devices-vulnerable-due-to-logic-flaw-exposing-internal-networks/</loc>
		<lastmod>2025-11-17T21:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pennsylvania-attorney-general-says-ssns-stolen-during-august-ransomware-attack-2/</loc>
		<lastmod>2025-11-17T21:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payroll-pirates-inside-the-criminal-networks-hijacking-payroll-systems/</loc>
		<lastmod>2025-11-17T21:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-on-critical-lynx-gateway-flaw-leaks-data-in-cleartext/</loc>
		<lastmod>2025-11-17T21:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yurei-ransomware-encryption-mechanics-operational-model-and-data-exfiltration-methods/</loc>
		<lastmod>2025-11-17T21:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silentbutdeadly-new-tool-blocks-network-traffic-to-bypass-edr-and-antivirus/</loc>
		<lastmod>2025-11-17T21:03:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-launches-public-preview-of-its-alert-triage-and-investigation-agent-for-security-operations/</loc>
		<lastmod>2025-11-17T21:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-expansion-of-pig-butchering-scam-operations/</loc>
		<lastmod>2025-11-17T21:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pre-installed-spyware-found-on-samsung-galaxy-devices-and-cannot-be-removed/</loc>
		<lastmod>2025-11-17T21:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-entra-invitations-hijacked-in-surge-of-toad-phishing-attacks/</loc>
		<lastmod>2025-11-17T21:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-expansion-of-pig-butchering-scam-operations-2/</loc>
		<lastmod>2025-11-17T21:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-machines-attack-machines-the-new-reality-of-ai-security/</loc>
		<lastmod>2025-11-17T22:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-firewall-unified-ccx-and-ise-vulnerability-summary-nov-2025/</loc>
		<lastmod>2025-11-17T22:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-eyeing-china-plans-hiring-spree-to-rebuild-its-depleted-ranks/</loc>
		<lastmod>2025-11-17T22:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinets-delayed-alert-on-actively-exploited-defect-put-defenders-at-a-disadvantage/</loc>
		<lastmod>2025-11-17T22:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dozens-of-groups-call-for-governments-to-protect-encryption/</loc>
		<lastmod>2025-11-17T22:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-and-soldiers-let-too-many-secrets-slip-on-social-networks-watchdog-says/</loc>
		<lastmod>2025-11-17T22:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alice-blue-partners-with-accuknox-for-regulatory-compliance-3/</loc>
		<lastmod>2025-11-17T22:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-countdown-to-q-day/</loc>
		<lastmod>2025-11-17T22:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/echogram-the-attack-that-can-break-ai-guardrails/</loc>
		<lastmod>2025-11-17T22:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurofiber-france-warns-of-breach-after-hacker-tries-to-sell-customer-data/</loc>
		<lastmod>2025-11-17T22:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-fortiweb-waf-bug-exploited-in-the-wild/</loc>
		<lastmod>2025-11-17T22:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-imsi-catchers-by-characterizing-identity-exposing-messages-in-cellular-traffic/</loc>
		<lastmod>2025-11-17T23:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-plead-guilty-to-laptop-farm-and-id-theft-scheme-to-land-north-koreans-us-it-jobs/</loc>
		<lastmod>2025-11-17T23:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/largest-ever-cloud-ddos-attack-pummels-azure-with-3-64b-packets-per-second/</loc>
		<lastmod>2025-11-17T23:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitsgap-vs-haasonline-advanced-features-vs-smart-simplicity/</loc>
		<lastmod>2025-11-17T23:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-hack-cost-260-million/</loc>
		<lastmod>2025-11-17T23:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inspector-general-flags-security-gap-in-nih-genomics-project/</loc>
		<lastmod>2025-11-17T23:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-use-spearspecter-to-target-senior-government-leaders/</loc>
		<lastmod>2025-11-17T23:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-3-spotted-on-ai-studio-ahead-of-imminent-release/</loc>
		<lastmod>2025-11-17T23:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-citizens-plead-guilty-to-aiding-north-korean-it-worker-campaigns/</loc>
		<lastmod>2025-11-17T23:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-effective-secret-scanning-solution/</loc>
		<lastmod>2025-11-18T00:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-future-innovations-excite-leaders-in-agentic-ai-security/</loc>
		<lastmod>2025-11-18T00:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adaptable-are-ai-driven-security-systems-to-new-threats/</loc>
		<lastmod>2025-11-18T00:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-current-iam-solutions-capable-of-handling-nhis-effectively/</loc>
		<lastmod>2025-11-18T00:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-bot-warning-the-products-to-protect/</loc>
		<lastmod>2025-11-18T00:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-effective-secret-scanning-solution-2/</loc>
		<lastmod>2025-11-18T00:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-perfect-storm-ddos-attack-hits-turkish-luxury-retailer-during-fall-collection-launch/</loc>
		<lastmod>2025-11-18T00:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-bei-verbrauchern-immer-beliebter-bei-cyberkriminellen-auch/</loc>
		<lastmod>2025-11-18T00:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/werkzeuge-fur-phishing-angriffe-eset-warnung-vor-missbrauch-von-ki-chatbots/</loc>
		<lastmod>2025-11-18T00:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-sind-eure-erfahrungen-mit-der-sepa-prufung-vop-der-banken/</loc>
		<lastmod>2025-11-18T00:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xais-grok-4-1-rolls-out-with-improved-quality-and-speed-for-free/</loc>
		<lastmod>2025-11-18T00:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-perfect-storm-ddos-attack-hits-turkish-luxury-retailer-during-fall-collection-launch-2/</loc>
		<lastmod>2025-11-18T00:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-bei-verbrauchern-immer-beliebter-bei-cyberkriminellen-auch-2/</loc>
		<lastmod>2025-11-18T00:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-malware-now-hacks-servers-using-xwiki-flaw/</loc>
		<lastmod>2025-11-18T00:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-apt-spearspecter-uses-weeks-long-whatsapp-lures-and-fileless-tamecat-backdoor-to-hit-defense/</loc>
		<lastmod>2025-11-18T01:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragon-breath-apt-deploys-roningloader-using-kernel-driver-and-ppl-abuse-to-disable-windows-defender/</loc>
		<lastmod>2025-11-18T01:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-10-kb5072653-oob-update-fixes-esu-install-errors/</loc>
		<lastmod>2025-11-18T01:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-abuse-adspect-redirects-to-evade-security/</loc>
		<lastmod>2025-11-18T01:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-online-betrug-durch-deepfakes-rasant-zunimmt/</loc>
		<lastmod>2025-11-18T04:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/klare-verantwortlichkeiten-gefordert/</loc>
		<lastmod>2025-11-18T04:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-windows-10-update-flaw/</loc>
		<lastmod>2025-11-18T04:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-puts-defenders-on-a-tighter-timeline-to-adapt/</loc>
		<lastmod>2025-11-18T05:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-privacy-panic-around-machine-learning-is-overblown/</loc>
		<lastmod>2025-11-18T06:00:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-puts-defenders-on-a-tighter-timeline-to-adapt-2/</loc>
		<lastmod>2025-11-18T06:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-privacy-panic-around-machine-learning-is-overblown-2/</loc>
		<lastmod>2025-11-18T06:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-issues-security-fix-for-actively-exploited-chrome-v8-zero-day-vulnerability/</loc>
		<lastmod>2025-11-18T06:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-issues-security-fix-for-actively-exploited-chrome-v8-zero-day-vulnerability-2/</loc>
		<lastmod>2025-11-18T06:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-puts-defenders-on-a-tighter-timeline-to-adapt-3/</loc>
		<lastmod>2025-11-18T06:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-takes-down-bulletproof-hosting-hub-linked-to-80-cybercrime-cases/</loc>
		<lastmod>2025-11-18T06:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-pros-should-know-about-insurance-coverage-for-ai-chatbot-wiretapping-claims/</loc>
		<lastmod>2025-11-18T06:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-attackers-use-patience-to-push-past-ai-guardrails/</loc>
		<lastmod>2025-11-18T07:00:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-takes-down-bulletproof-hosting-hub-linked-to-80-cybercrime-cases-2/</loc>
		<lastmod>2025-11-18T07:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-patchday-november-2025-fest-kodierte-anmeldedaten-im-sap-sql-anywhere-monitor/</loc>
		<lastmod>2025-11-18T07:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-identity-for-the-ai-era-cisos-must-build-trust-at-machine-speed/</loc>
		<lastmod>2025-11-18T07:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-physische-systeme-im-visier-von-apt-gruppen-wie-staatlich-unterstutzte-angreifer-ot-systeme-ins-visier-nehmen/</loc>
		<lastmod>2025-11-18T08:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fintech-leaders-call-for-united-front-against-ai-driven-cyber-crime/</loc>
		<lastmod>2025-11-18T09:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/w3-total-cache-security-vulnerability-exposes-one-million-wordpress-sites-to-rce/</loc>
		<lastmod>2025-11-18T09:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-compromised-rdp-to-deploy-lynx-ransomware-after-deleting-backups/</loc>
		<lastmod>2025-11-18T09:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imunify-ai-bolit-flaw-allows-arbitrary-code-execution-and-root-privilege-escalation/</loc>
		<lastmod>2025-11-18T09:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mapping-remcos-rat-c2-activity-and-associated-communication-ports/</loc>
		<lastmod>2025-11-18T09:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fintech-leaders-call-for-united-front-against-ai-driven-cyber-crime-2/</loc>
		<lastmod>2025-11-18T09:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/w3-total-cache-security-vulnerability-exposes-one-million-wordpress-sites-to-rce-2/</loc>
		<lastmod>2025-11-18T09:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-zero-day-type-confusion-flaw-actively-exploited-in-the-wild/</loc>
		<lastmod>2025-11-18T09:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-apt-groups-new-scoringmathtea-rat-enhances-remote-command-execution-and-more/</loc>
		<lastmod>2025-11-18T09:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-15-tbps-ddos-attack-from-500k-devices-slams-azure-network/</loc>
		<lastmod>2025-11-18T09:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc1549-hackers-with-custom-tools-attacking-aerospace-and-defense-systems-to-steal-logins/</loc>
		<lastmod>2025-11-18T09:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-zero-day-type-confusion-flaw-actively-exploited-in-the-wild-2/</loc>
		<lastmod>2025-11-18T09:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-apt-groups-new-scoringmathtea-rat-enhances-remote-command-execution-and-more-2/</loc>
		<lastmod>2025-11-18T09:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konkrete-masnahmen-statt-bloser-problembeschreibungen-grune-fordern-sicherheitsoffensive-noch-vor-weihnachten/</loc>
		<lastmod>2025-11-18T09:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-reports-active-attacks-on-fortiweb-waf-vulnerability-allowing-admin-access/</loc>
		<lastmod>2025-11-18T09:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-sicherheit-durch-intelligente-dateninfrastruktur/</loc>
		<lastmod>2025-11-18T09:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governing-the-unseen-risks-of-genai-why-bias-mitigation-and-human-oversight-matter-most/</loc>
		<lastmod>2025-11-18T10:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-battle-over-the-search-of-a-cell-phone-feds-v-locals/</loc>
		<lastmod>2025-11-18T10:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-bleibt-aggressiv-und-fragmentiert/</loc>
		<lastmod>2025-11-18T10:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/herausforderungen-der-post-quanten-kryptografie/</loc>
		<lastmod>2025-11-18T10:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governing-the-unseen-risks-of-genai-why-bias-mitigation-and-human-oversight-matter-most-2/</loc>
		<lastmod>2025-11-18T10:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-blocks-15-72-tbps-aisuru-botnet-ddos-attack/</loc>
		<lastmod>2025-11-18T10:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-battle-over-the-search-of-a-cell-phone-feds-v-locals-2/</loc>
		<lastmod>2025-11-18T10:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixed-the-seventh-chrome-zero-day-in-2025/</loc>
		<lastmod>2025-11-18T10:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-mitigates-record-5-72-tbps-ddos-attack-driven-by-aisuru-botnet/</loc>
		<lastmod>2025-11-18T10:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-code-execution-datenschutzer-rat-nach-wunderland-hackerangriff-zu-vorsicht/</loc>
		<lastmod>2025-11-18T10:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-in-v8-angreifer-attackieren-chrome-nutzer-uber-javascript-engine/</loc>
		<lastmod>2025-11-18T10:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-dods-missteps-teach-us-about-cybersecurity-fundamentals-for-2026/</loc>
		<lastmod>2025-11-18T11:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/master-how-to-report-a-breach-for-fast-and-effective-cyber-incident-response/</loc>
		<lastmod>2025-11-18T11:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dr-richard-zhao-from-nsfocus-selected-into-2025-top-10-cybersecurity-professionals-by-leading-consulting-company/</loc>
		<lastmod>2025-11-18T11:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kerberoasting-im-jahr-2025-so-schutzen-sie-ihre-servicekonten-redirect/</loc>
		<lastmod>2025-11-18T11:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boost-your-cyber-defense-with-unified-cybersecurity-and-grc-strategies/</loc>
		<lastmod>2025-11-18T11:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-dods-missteps-teach-us-about-cybersecurity-fundamentals-for-2026-2/</loc>
		<lastmod>2025-11-18T11:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-new-chrome-zero-day-flaw-exploited-in-attacks/</loc>
		<lastmod>2025-11-18T11:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-mitigates-record-15-72-tbps-ddos-attack-driven-by-aisuru-botnet/</loc>
		<lastmod>2025-11-18T11:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/half-a-million-stolen-ftse-100-credentials-found-on-criminal-sites/</loc>
		<lastmod>2025-11-18T11:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sans-institute-startet-dritte-staffel-des-cyber-leaders-podcasts/</loc>
		<lastmod>2025-11-18T11:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-unterstutzung-fur-penetrationstests-mit-kali-linux-kaligpt-automatisiert-pentest-in-kali-linux-mit-naturlicher-sprache/</loc>
		<lastmod>2025-11-18T11:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-in-v8-hacker-attackieren-chrome-nutzer-uber-javascript-engine/</loc>
		<lastmod>2025-11-18T11:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/500-000-ip-adressen-beteiligt-rekord-ddos-botnetz-attackiert-microsoft-azure/</loc>
		<lastmod>2025-11-18T11:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/330-custom-email-domains-and-what-this-tells-us-about-how-attackers-build-infrastructure-for-fake-account-creation/</loc>
		<lastmod>2025-11-18T11:58:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-indias-digital-personal-data-potection-act-2025-a-complete-overview/</loc>
		<lastmod>2025-11-18T11:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-snapshots-to-signals-the-end-of-pointtime-compliance/</loc>
		<lastmod>2025-11-18T11:58:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-blocks-record-15-tbps-ddos-attack-as-iot-botnets-gain-new-firepower/</loc>
		<lastmod>2025-11-18T11:59:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-realities-of-ciso-burnout-and-exhaustion/</loc>
		<lastmod>2025-11-18T11:59:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-miracle-a-company-says-sorry-after-a-cyber-attack-and-donates-the-ransom-to-cybersecurity-research/</loc>
		<lastmod>2025-11-18T11:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-in-snort3-enhanced-rule-grouping-for-greater-flexibility-and-control/</loc>
		<lastmod>2025-11-18T11:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-outlines-its-global-digital-future-and-cybersecurity-vision-at-wtdc-25/</loc>
		<lastmod>2025-11-18T12:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/softcat-update-signals-strong-q1/</loc>
		<lastmod>2025-11-18T12:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/genai-and-deepfakes-drive-digital-forgeries-and-biometric-fraud/</loc>
		<lastmod>2025-11-18T12:00:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alternative-cloud-dienste-wechselstrategie-gut-vorbereiten-so-geht-onshoring-von-cloud-anbietern-aus-den-usa/</loc>
		<lastmod>2025-11-18T12:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlag-gegen-cybercrime-hunderte-server-von-bulletproof-hoster-beschlagnahmt/</loc>
		<lastmod>2025-11-18T12:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinets-silent-patch-sparks-alarm-as-a-critical-fortiweb-flaw-is-exploited-in-the-wild/</loc>
		<lastmod>2025-11-18T12:57:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-galaxy-smartphones-und-spyware/</loc>
		<lastmod>2025-11-18T12:58:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-yet-another-exploited-chrome-zero-day-cve-2025-13223/</loc>
		<lastmod>2025-11-18T12:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-hit-by-outage-affecting-global-network-services/</loc>
		<lastmod>2025-11-18T12:58:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/learn-how-leading-companies-secure-cloud-workloads-and-infrastructure-at-scale/</loc>
		<lastmod>2025-11-18T12:58:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-iam-silos-why-the-identity-security-fabric-is-essential-for-securing-ai-and-non-human-identities/</loc>
		<lastmod>2025-11-18T12:59:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seven-npm-packages-use-adspect-cloaking-to-trick-victims-into-crypto-scam-pages/</loc>
		<lastmod>2025-11-18T12:59:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stadtwerke-detmold-von-hackerangriff-betroffen/</loc>
		<lastmod>2025-11-18T13:57:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/full-renewal-of-state-and-local-cyber-grants-program-passes-in-house/</loc>
		<lastmod>2025-11-18T13:58:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-increasingly-target-operational-technology-with-manufacturing-sector-bearing-the-brunt/</loc>
		<lastmod>2025-11-18T14:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-sicherheit-gefahrliche-fehleinschatzungen-uber-scheinbar-grundlegende-funktionalitaten-bedrohen-die-sicherheit/</loc>
		<lastmod>2025-11-18T14:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tuta-warnt-google-will-gmail-per-ai-scannen/</loc>
		<lastmod>2025-11-18T14:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-vulnerabilities-mount-but-patching-still-a-problem/</loc>
		<lastmod>2025-11-18T15:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-simple-whatsapp-security-flaw-exposed-3-5-billion-phone-numbers/</loc>
		<lastmod>2025-11-18T15:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-confirms-data-breach-exposing-customer-personal-information/</loc>
		<lastmod>2025-11-18T15:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-use-deeproot-and-twostroke-malware-in-aerospace-and-defense-attacks/</loc>
		<lastmod>2025-11-18T16:20:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-enhanced-tuoni-framework-targets-major-us-real-estate-firm/</loc>
		<lastmod>2025-11-18T16:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-hat-nahezu-monopolstellung-digitale-abhangigkeit-der-verwaltung-schluckt-milliarden-an-steuern/</loc>
		<lastmod>2025-11-18T16:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-macht-aus-iphone-ein-ipad-mit-multitasking/</loc>
		<lastmod>2025-11-18T16:21:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gryphon-investors-to-sell-3cloud-to-cognizant/</loc>
		<lastmod>2025-11-18T16:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-quantum-future-is-coming-hackers-are-already-preparing/</loc>
		<lastmod>2025-11-18T16:21:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-merges-training-content-to-create-studios/</loc>
		<lastmod>2025-11-18T16:21:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-unveils-top-10-cybersecurity-predictions-poised-to-disrupt-identity-security-in-2026/</loc>
		<lastmod>2025-11-18T16:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appsec-metrics-fail-mend-ios-risk-reduction-dashboard-fixes-it/</loc>
		<lastmod>2025-11-18T16:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/richland-county-cusd-finds-more-bang-for-the-buck-with-managedmethods/</loc>
		<lastmod>2025-11-18T16:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/energiesektor-im-visier-von-hackern/</loc>
		<lastmod>2025-11-18T16:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mi5-warns-of-chinese-spies-using-linkedin-to-gain-intel-on-lawmakers/</loc>
		<lastmod>2025-11-18T16:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-unveils-top-10-cybersecurity-predictions-poised-to-disrupt-identity-security-in-2026-2/</loc>
		<lastmod>2025-11-18T16:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-big-ai-announcements-at-opentext-world-2025/</loc>
		<lastmod>2025-11-18T16:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detmold-stadtwerke-nach-cyberangriff-offline-ludwigshafen-autohandler-nach-cyberangriff-gekniffen/</loc>
		<lastmod>2025-11-18T16:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-group-has-defrauded-244-million-in-ransomware-payments-says-fbi/</loc>
		<lastmod>2025-11-18T16:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoomers-are-officially-worse-at-passwords-than-80-year-olds/</loc>
		<lastmod>2025-11-18T16:05:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-big-ai-announcements-at-opentext-world-2025-2/</loc>
		<lastmod>2025-11-18T16:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ping-keyless-deal-highlights-authentication-gaps-for-frontline-workers/</loc>
		<lastmod>2025-11-18T16:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-hit-checkout-com-rejects-ransom-payment/</loc>
		<lastmod>2025-11-18T16:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-computers-show-promise-in-fraud-detection/</loc>
		<lastmod>2025-11-18T16:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-post-breach-impacts-nearly-10k/</loc>
		<lastmod>2025-11-18T16:08:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-cybercrime-portal-exploited-by-scammers/</loc>
		<lastmod>2025-11-18T16:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ping-keyless-deal-highlights-authentication-gaps-for-frontline-workers-2/</loc>
		<lastmod>2025-11-18T16:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-cloud-infrastructure-threatened-by-newly-patched-bug/</loc>
		<lastmod>2025-11-18T16:09:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contagious-interview-campaign-exploits-json-storage-for-malware-deployment/</loc>
		<lastmod>2025-11-18T16:10:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-cloud-infrastructure-threatened-by-newly-patched-bug-2/</loc>
		<lastmod>2025-11-18T16:10:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contagious-interview-campaign-exploits-json-storage-for-malware-deployment-2/</loc>
		<lastmod>2025-11-18T16:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-oks-funding-bill-renewing-cyber-threat-sharing-state-and-local-cyber-grants/</loc>
		<lastmod>2025-11-18T16:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-oks-funding-bill-renewing-cyber-threat-sharing-state-and-local-cyber-grants-2/</loc>
		<lastmod>2025-11-18T16:11:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-fake-travel-sites-used-in-ongoing-russian-phishing-campaign/</loc>
		<lastmod>2025-11-18T16:11:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-cloud-infrastructure-threatened-by-newly-patched-bug-3/</loc>
		<lastmod>2025-11-18T16:11:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-fake-travel-sites-used-in-ongoing-russian-phishing-campaign-2/</loc>
		<lastmod>2025-11-18T16:12:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/benchmarking-optimizes-kraken-ransomware-encryption/</loc>
		<lastmod>2025-11-18T16:12:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contagious-interview-campaign-exploits-json-storage-for-malware-deployment-3/</loc>
		<lastmod>2025-11-18T16:12:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/benchmarking-optimizes-kraken-ransomware-encryption-2/</loc>
		<lastmod>2025-11-18T16:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-cloud-infrastructure-threatened-by-newly-patched-bug-4/</loc>
		<lastmod>2025-11-18T16:13:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-just-a-password-cybersecurity-lessons-from-the-louvre-heist/</loc>
		<lastmod>2025-11-18T16:14:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-safery-steals-crypto-wallet-seed-phrases/</loc>
		<lastmod>2025-11-18T16:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-surged-30-in-october/</loc>
		<lastmod>2025-11-18T16:15:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-just-a-password-cybersecurity-lessons-from-the-louvre-heist-2/</loc>
		<lastmod>2025-11-18T16:15:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojai-launches-trojai-defend-for-mcp/</loc>
		<lastmod>2025-11-18T16:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrog-introduces-shadow-ai-detection-for-secure-software-supply-chain/</loc>
		<lastmod>2025-11-18T16:15:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-safery-steals-crypto-wallet-seed-phrases-2/</loc>
		<lastmod>2025-11-18T16:15:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-surged-30-in-october-2/</loc>
		<lastmod>2025-11-18T16:15:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-unified-security-recommended-program-aims-to-streamline-security-ecosystem-with-major-partnerships/</loc>
		<lastmod>2025-11-18T16:16:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-screen-sharing-scam-exploits-trust-and-urgency/</loc>
		<lastmod>2025-11-18T16:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indonesianfoods-worm-a-massive-spam-campaign-in-the-npm-ecosystem/</loc>
		<lastmod>2025-11-18T16:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/for-better-identity-security-control-entitlement-entanglements/</loc>
		<lastmod>2025-11-18T16:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/channel-brief-partners-look-for-stronger-incentives-smarter-ai-and-real-paths-to-growth/</loc>
		<lastmod>2025-11-18T16:17:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mssp-market-news-the-trends-and-moves-that-took-shape-this-week/</loc>
		<lastmod>2025-11-18T16:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-asa-firewalls-still-under-attack-cisa-issues-guidance-for-patch/</loc>
		<lastmod>2025-11-18T16:17:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/changes-in-the-channel-people-moves-and-shakeups-november-10-november-14/</loc>
		<lastmod>2025-11-18T16:17:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/misconfigurations-at-scale-why-salesforce-drift-is-the-new-shadow-it/</loc>
		<lastmod>2025-11-18T16:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-unveils-top-10-cybersecurity-predictions-poised-to-disrupt-identity-security-in-2026-3/</loc>
		<lastmod>2025-11-18T16:17:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-data-breach-exposes-personal-info-after-social-engineering-attack/</loc>
		<lastmod>2025-11-18T16:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-slowly-recovers-after-far-reaching-cloudflare-outage/</loc>
		<lastmod>2025-11-18T16:18:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-fends-off-largest-ddos-attack-ever-observed-in-the-cloud/</loc>
		<lastmod>2025-11-18T16:18:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon-2fa-and-the-collapse-of-legacy-mfa/</loc>
		<lastmod>2025-11-18T16:19:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-data-breach-exposes-personal-info-after-social-engineering-attack-2/</loc>
		<lastmod>2025-11-18T16:19:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-detail-tuoni-c2s-role-in-an-attempted-2025-real-estate-cyber-intrusion/</loc>
		<lastmod>2025-11-18T16:19:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-slowly-recovers-after-far-reaching-cloudflare-outage-2/</loc>
		<lastmod>2025-11-18T16:19:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oops-vmware-admits-it-over-specced-storage-servers-for-years/</loc>
		<lastmod>2025-11-18T17:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-suspect-detained-in-thailand-is-allegedly-tied-to-void-blizzard-group/</loc>
		<lastmod>2025-11-18T17:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-reports-major-earnings-impact-from-cyberattack/</loc>
		<lastmod>2025-11-18T17:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-tycoon-2fa-phishing-platform-and-the-collapse-of-legacy-mfa/</loc>
		<lastmod>2025-11-18T17:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-launches-github-connect-to-proactively-discover-shadow-apis-and-mcp-risks-in-code-repositories/</loc>
		<lastmod>2025-11-18T17:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-2015-receives-extension-offering-brief-relief-for-cyber-information-sharing/</loc>
		<lastmod>2025-11-18T17:11:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitymetrics-wins-data-leak-detection-solution-of-the-year/</loc>
		<lastmod>2025-11-18T17:13:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-strategy-will-emphasize-deterring-adversaries-industry-partnerships/</loc>
		<lastmod>2025-11-18T17:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-ignite-2025-the-biggest-partner-program-security-news/</loc>
		<lastmod>2025-11-18T17:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-expands-whatsapp-security-research-with-new-proxy-tool-and-4m-in-bounties-this-year/</loc>
		<lastmod>2025-11-18T17:14:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitymetrics-wins-data-leak-detection-solution-of-the-year-2/</loc>
		<lastmod>2025-11-18T17:14:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-npm-malware-campaign-redirects-victims-to-crypto-sites/</loc>
		<lastmod>2025-11-18T17:14:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-strategy-will-emphasize-deterring-adversaries-industry-partnerships-2/</loc>
		<lastmod>2025-11-18T17:14:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-data-privacy-risk-lurking-in-paperless-government/</loc>
		<lastmod>2025-11-18T17:15:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-doubles-down-on-identity-security-with-acquisition-of-inside-agent/</loc>
		<lastmod>2025-11-18T17:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-voter-engagement/</loc>
		<lastmod>2025-11-18T18:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-strategy-will-emphasize-adversary-deterrence-industry-partnerships/</loc>
		<lastmod>2025-11-18T18:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-cloudflare-down-latest-reports-from-cloudflare/</loc>
		<lastmod>2025-11-18T18:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-cyber-strategy-will-include-focus-on-shaping-adversary-behavior-white-house-official-says/</loc>
		<lastmod>2025-11-18T18:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/completed-draft-of-cyber-strategy-emphasizes-imposing-costs-industry-partnership/</loc>
		<lastmod>2025-11-18T18:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-advice-i-would-give-on-a-mentorship-call/</loc>
		<lastmod>2025-11-18T18:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-outage-throws-a-wrench-in-global-internet-access/</loc>
		<lastmod>2025-11-18T18:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-outage-jolts-the-internet-what-happened-and-who-was-hit/</loc>
		<lastmod>2025-11-18T18:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-is-bringing-native-sysmon-support-to-windows-11-server-2025/</loc>
		<lastmod>2025-11-18T18:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-agency-pajemploi-reports-data-breach-affecting-1-2m-people/</loc>
		<lastmod>2025-11-18T18:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-to-let-users-report-messages-wrongly-flagged-as-threats/</loc>
		<lastmod>2025-11-18T18:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-bounty-programs-rise-as-key-strategic-security-solutions/</loc>
		<lastmod>2025-11-18T18:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-abuse-adspect-cloaking-in-crypto-scam/</loc>
		<lastmod>2025-11-18T18:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prioritizing-executive-security-to-manage-risk/</loc>
		<lastmod>2025-11-18T19:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-spatial-domain-wireless-jamming-with-reconfigurable-intelligent-surfaces/</loc>
		<lastmod>2025-11-18T19:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bonkers-bitcoin-heist-5-star-hotels-cash-filled-envelopes-vanishing-funds/</loc>
		<lastmod>2025-11-18T19:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-group-claims-hits-on-danish-party-websites-as-voters-head-to-polls/</loc>
		<lastmod>2025-11-18T19:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-looks-to-torch-biden-era-cyber-rules-sparked-by-salt-typhoon-mess/</loc>
		<lastmod>2025-11-18T19:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prioritizing-executive-security-to-manage-risk-2/</loc>
		<lastmod>2025-11-18T19:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/take-fight-to-the-enemy-us-cyber-boss-says/</loc>
		<lastmod>2025-11-18T19:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-bug-exploited-as-an-0-day-patch-now-or-risk-full-system-compromise/</loc>
		<lastmod>2025-11-18T19:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-resilience-may-be-improving-in-the-health-sector/</loc>
		<lastmod>2025-11-18T19:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-integrate-sysmon-directly-into-windows-11-server-2025/</loc>
		<lastmod>2025-11-18T19:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fends-off-massive-ddos-attack-by-aisuru-botnet-operators/</loc>
		<lastmod>2025-11-18T20:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-cloud-vulnerability-management-reducing-vulnerability-risk-in-the-cloud-era/</loc>
		<lastmod>2025-11-18T20:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-work-for-admins-as-google-patches-latest-zero-day-chrome-vulnerability/</loc>
		<lastmod>2025-11-18T20:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fends-off-massive-ddos-attack-by-aisuru-botnet-operators-2/</loc>
		<lastmod>2025-11-18T20:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-cloud-vulnerability-management-reducing-vulnerability-risk-in-the-cloud-era-2/</loc>
		<lastmod>2025-11-18T20:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-fraud-prevention-financial-cyber-summits-the-ai-bet/</loc>
		<lastmod>2025-11-18T20:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-fraud-prevention-financial-cyber-summits-the-ai-bet-2/</loc>
		<lastmod>2025-11-18T20:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-integriert-lakera-in-seine-webfirewall/</loc>
		<lastmod>2025-11-18T20:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-integriert-lakera-in-seine-webfirewall-2/</loc>
		<lastmod>2025-11-18T20:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-gets-new-cloud-rebuild-pointtime-restore-tools/</loc>
		<lastmod>2025-11-18T20:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-gets-new-cloud-rebuild-pointtime-restore-tools-2/</loc>
		<lastmod>2025-11-18T20:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-warns-of-new-fortiweb-zero-day-exploited-in-attacks/</loc>
		<lastmod>2025-11-18T20:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-warns-of-new-fortiweb-zero-day-exploited-in-attacks-2/</loc>
		<lastmod>2025-11-18T20:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-gets-new-cloud-rebuild-pointtime-restore-tools-3/</loc>
		<lastmod>2025-11-18T20:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-technique-shows-gaps-in-llm-safety-screening/</loc>
		<lastmod>2025-11-18T20:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sneaky-2fa-phishing-kit-adds-bitb-pop-ups-designed-to-mimic-the-browser-address-bar/</loc>
		<lastmod>2025-11-18T20:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-warns-of-new-fortiweb-zero-day-exploited-in-attacks-3/</loc>
		<lastmod>2025-11-18T20:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-technique-shows-gaps-in-llm-safety-screening-2/</loc>
		<lastmod>2025-11-18T20:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-europaische-souveranitat-der-gipfel-der-it-abgehangten/</loc>
		<lastmod>2025-11-18T20:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-cloud-to-code-salt-cloud-connect-now-scans-github/</loc>
		<lastmod>2025-11-18T21:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lg-battery-subsidiary-says-ransomware-attack-targeted-overseas-facility/</loc>
		<lastmod>2025-11-18T21:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cbo-director-testifies-that-hackers-have-been-expelled-from-email-systems/</loc>
		<lastmod>2025-11-18T21:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-screen-sharing-scam-drains-700k-in-minutes/</loc>
		<lastmod>2025-11-18T21:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-alleges-major-data-breach-targeting-under-armour/</loc>
		<lastmod>2025-11-18T21:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitymetrics-wins-data-leak-detection-solution-of-the-year-3/</loc>
		<lastmod>2025-11-18T21:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-unveils-top-10-cybersecurity-predictions-poised-to-disrupt-identity-security-in-2026-4/</loc>
		<lastmod>2025-11-18T21:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-echogram-trick-makes-ai-models-accept-dangerous-inputs/</loc>
		<lastmod>2025-11-18T21:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/princeton-university-data-breach-donor-information-exposed-in-compromised-database/</loc>
		<lastmod>2025-11-18T21:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitymetrics-wins-data-leak-detection-solution-of-the-year-4/</loc>
		<lastmod>2025-11-18T21:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-confirms-data-breach-compromised-user-data/</loc>
		<lastmod>2025-11-18T21:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-unveils-top-10-cybersecurity-predictions-poised-to-disrupt-identity-security-in-2026-5/</loc>
		<lastmod>2025-11-18T21:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-echogram-trick-makes-ai-models-accept-dangerous-inputs-2/</loc>
		<lastmod>2025-11-18T21:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-screen-sharing-scam-how-attackers-are-deceiving-users-to-expose-sensitive-information/</loc>
		<lastmod>2025-11-18T21:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-play-store-to-show-warning-for-power-hungry-apps/</loc>
		<lastmod>2025-11-18T21:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-dismantle-thousands-of-servers-from-illicit-hosting-company-linked-to-cyberattacks/</loc>
		<lastmod>2025-11-18T21:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-screen-sharing-scam-how-attackers-are-deceiving-users-to-expose-sensitive-information-2/</loc>
		<lastmod>2025-11-18T21:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-play-store-to-show-warning-for-power-hungry-apps-2/</loc>
		<lastmod>2025-11-18T21:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/w3-total-cache-vulnerability-puts-over-one-million-wordpress-sites-at-risk/</loc>
		<lastmod>2025-11-18T22:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pennsylvania-office-of-the-attorney-general-oag-confirms-data-breach-after-august-attack/</loc>
		<lastmod>2025-11-18T22:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omni-family-health-settles-lawsuits-from-2024-hack-for-6-5m/</loc>
		<lastmod>2025-11-18T22:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/princeton-university-confirms-data-breach-affecting-advancement-records/</loc>
		<lastmod>2025-11-18T22:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-shadowray-attacks-convert-ray-clusters-into-crypto-miners/</loc>
		<lastmod>2025-11-18T22:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-a-global-decentralized-system-save-cve-data/</loc>
		<lastmod>2025-11-18T22:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-evocrawl-exploring-web-application-code-and-state-using-evolutionary-search/</loc>
		<lastmod>2025-11-18T23:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/updated-response-to-cisa-advisory-aa24-109a-stopransomware-akira-ransomware/</loc>
		<lastmod>2025-11-18T23:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ssojet-is-a-strong-choice-for-teams-migrating-from-aws-cognito-auth0-or-workos/</loc>
		<lastmod>2025-11-18T23:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hyper-realistic-synthetic-data-via-agentic-ai-has-arrived-meet-the-fabricate-data-agent/</loc>
		<lastmod>2025-11-18T23:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/information-sharing-laws-expiration-could-squander-government-vulnerability-hunting-efforts-senator-says/</loc>
		<lastmod>2025-11-18T23:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-evocrawl-exploring-web-application-code-and-state-using-evolutionary-search-2/</loc>
		<lastmod>2025-11-18T23:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-turn-open-source-ai-framework-into-global-cryptojacking-operation/</loc>
		<lastmod>2025-11-18T23:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-replicating-botnet-attacks-ray-clusters/</loc>
		<lastmod>2025-11-18T23:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-finds-new-malware-backdoors-linked-to-iran/</loc>
		<lastmod>2025-11-18T23:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cyber-defense-agency-admits-to-major-staffing-crisis/</loc>
		<lastmod>2025-11-18T23:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-outage-shows-why-cyber-resilience-matters/</loc>
		<lastmod>2025-11-18T23:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thunderbird-adds-native-support-for-microsoft-exchange-accounts/</loc>
		<lastmod>2025-11-18T23:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-break-iot-devices-open-to-silent-takeover-via-firewalls/</loc>
		<lastmod>2025-11-18T23:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-nexus-threat-actor-unc1549-takes-aim-at-aerospace/</loc>
		<lastmod>2025-11-18T23:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-u-s-citizens-ukrainian-plead-guilty-in-n-korea-it-worker-scheme/</loc>
		<lastmod>2025-11-18T23:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-data-broker-to-stop-selling-individuals-travel-records-to-government-agencies/</loc>
		<lastmod>2025-11-18T23:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alternativen-zu-hyperscalern-suchen-cloudflare-ausfall-vom-18-november-2025-zeigt-notwendigkeit-auf/</loc>
		<lastmod>2025-11-19T00:00:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-nutzung-und-nis-2-its-bb-e-v-ladt-zu-online-veranstaltung-am-20-november-2025-ein/</loc>
		<lastmod>2025-11-19T00:00:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-single-sign-on-and-why-do-i-need-to-create-an-account/</loc>
		<lastmod>2025-11-19T00:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ai-powered-cyberattack-causes-a-stir/</loc>
		<lastmod>2025-11-19T00:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-disruption-of-an-ai-run-attack-and-what-it-means-for-agentic-identity/</loc>
		<lastmod>2025-11-19T05:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comprehensive-guide-to-risk-based-authorization-for-identity-and-access-management/</loc>
		<lastmod>2025-11-19T05:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-4-most-common-ai-agent-deployment-patterns-and-what-they-mean-for-identity-security/</loc>
		<lastmod>2025-11-19T05:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-spycloud-forecasts-top-10-identity-threats-set-to-define-2026-security-landscape/</loc>
		<lastmod>2025-11-19T05:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/confidential-computing-sichere-datenverarbeitung-in-unsicheren-zeiten/</loc>
		<lastmod>2025-11-19T05:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-unc1549-infiltrates-aerospace-by-hijacking-trusted-dlls-and-executing-vdi-breakouts/</loc>
		<lastmod>2025-11-19T05:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-startup-mate-launches-with-ai-driven-security-operations-platform/</loc>
		<lastmod>2025-11-19T05:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-defines-a-smart-approach-to-non-human-identity-management/</loc>
		<lastmod>2025-11-19T06:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-safe-are-automated-nhi-lifecycle-management-systems/</loc>
		<lastmod>2025-11-19T06:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-certain-can-we-be-about-cloud-compliance-with-agentic-ai/</loc>
		<lastmod>2025-11-19T06:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-secrets-vaulting-offer-a-relaxed-approach-to-data-security/</loc>
		<lastmod>2025-11-19T06:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-brieftasche-kommt-gut-gefullt-nach-deutschland/</loc>
		<lastmod>2025-11-19T06:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cost-of-vulnerability-backlogs-and-how-to-eliminate-them/</loc>
		<lastmod>2025-11-19T06:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-recruiting-spies-in-the-uk-with-fake-headhunters-and-sites-like-linkedin/</loc>
		<lastmod>2025-11-19T06:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-ai-agents-to-automate-security-operations/</loc>
		<lastmod>2025-11-19T06:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-cut-security-tool-sprawl-without-losing-control/</loc>
		<lastmod>2025-11-19T06:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cost-of-vulnerability-backlogs-and-how-to-eliminate-them-2/</loc>
		<lastmod>2025-11-19T06:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-proton-pass-a-password-manager-with-identity-protection/</loc>
		<lastmod>2025-11-19T06:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-warns-of-new-fortiweb-cve-2025-58034-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2025-11-19T06:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-long-conversations-that-reveal-how-scammers-work/</loc>
		<lastmod>2025-11-19T06:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metis-open-source-ai-driven-tool-for-deep-security-code-review/</loc>
		<lastmod>2025-11-19T06:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hrs-role-in-preventing-insider-threats-4-best-practices/</loc>
		<lastmod>2025-11-19T07:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-sicherheitslucke-in-fortiweb-fortinet-patcht-zero-day-erst-nach-6-wochen/</loc>
		<lastmod>2025-11-19T07:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zuverlassige-daten-als-schlussel-zur-erfolgreichen-umsetzung-des-eu-ai-acts/</loc>
		<lastmod>2025-11-19T08:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/behind-the-firewall-the-hidden-struggles-of-cyber-professionals-with-a-disability/</loc>
		<lastmod>2025-11-19T08:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50000-cctvs-hacked-in-india-intimate-hospital-footage-sold-online/</loc>
		<lastmod>2025-11-19T08:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linus-torvalds-is-ok-with-vibe-coding-as-long-as-its-not-used-for-anything-that-matters/</loc>
		<lastmod>2025-11-19T08:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fortiweb-zero-day-cve-2025-58034-under-attack-patched-by-fortinet/</loc>
		<lastmod>2025-11-19T08:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-risiken-in-der-esecurity-durch-manipulierte-ki-tools-wie-angreifer-ki-assistenten-uber-e-mails-manipulieren/</loc>
		<lastmod>2025-11-19T08:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec-programs/</loc>
		<lastmod>2025-11-19T09:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec-programs-2/</loc>
		<lastmod>2025-11-19T09:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fuhrende-wissenschaftler-warnen-neuer-eu-vorschlag-zur-chatkontrolle-bleibt-hochriskant/</loc>
		<lastmod>2025-11-19T09:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurofiber-confirms-november-13-hack-data-theft-and-extortion-attempt/</loc>
		<lastmod>2025-11-19T09:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/network-architectures-must-be-rebuilt-for-agentic-ai/</loc>
		<lastmod>2025-11-19T09:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fortiweb-0-day-code-execution-flaw-actively-exploited/</loc>
		<lastmod>2025-11-19T09:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-shadowray-exploit-targets-vulnerability-in-ray-ai-framework-to-attack-ai-systems/</loc>
		<lastmod>2025-11-19T09:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-npm-malware-campaign-checks-if-visitor-is-a-victim-or-researcher-before-initiating-infection/</loc>
		<lastmod>2025-11-19T09:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-solarwinds-serv-u-flaws-allow-remote-admin-level-code-execution/</loc>
		<lastmod>2025-11-19T09:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-adds-azure-firewall-with-ai-powered-security-copilot/</loc>
		<lastmod>2025-11-19T09:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fortiweb-0-day-code-execution-flaw-actively-exploited-2/</loc>
		<lastmod>2025-11-19T09:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-kit-using-bitb-technique-targets-microsoft-accounts-to-steal-credentials-via-sneaky-2fa-attack/</loc>
		<lastmod>2025-11-19T09:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-net-malware-conceals-lokibot-inside-png-bmp-files-to-bypass-detection/</loc>
		<lastmod>2025-11-19T09:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-adds-new-threat-briefing-agent-inside-defender-portal/</loc>
		<lastmod>2025-11-19T09:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-reveals-full-technical-explanation-of-major-internet-outage/</loc>
		<lastmod>2025-11-19T09:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-cybersicherheit-in-zahlen-nis2-ein-viertel-der-unternehmen-ist-noch-planlos/</loc>
		<lastmod>2025-11-19T09:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australien-veraltete-smartphone-software-mundet-in-todesfall/</loc>
		<lastmod>2025-11-19T09:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurofiber-data-breach-hackers-exploited-vulnerability-to-exfiltrate-users-data/</loc>
		<lastmod>2025-11-19T09:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tens-of-thousands-more-asus-routers-pwned-by-suspected-evolving-china-operation/</loc>
		<lastmod>2025-11-19T10:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uae-to-launch-first-spaceground-quantum-communication-network/</loc>
		<lastmod>2025-11-19T10:12:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-integriert-intelix-in-microsoft-security-copilot-und-microsoft-365-copilot/</loc>
		<lastmod>2025-11-19T10:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-aligned-threat-actor-is-conducting-widespread-cyberespionage-campaigns/</loc>
		<lastmod>2025-11-19T11:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-deliverability-consultant-how-to-boost-campaign-roi/</loc>
		<lastmod>2025-11-19T11:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-die-neue-spielwiese-der-betruger/</loc>
		<lastmod>2025-11-19T11:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridewell-ceo-gives-cyber-predictions-for-2026/</loc>
		<lastmod>2025-11-19T11:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plushdaemon-hackers-hijack-software-updates-in-supply-chain-attacks/</loc>
		<lastmod>2025-11-19T11:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-aligned-threat-actor-is-conducting-widespread-cyberespionage-campaigns-2/</loc>
		<lastmod>2025-11-19T11:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vaping-is-everywhere-in-schools-sparking-a-bathroom-surveillance-boom/</loc>
		<lastmod>2025-11-19T11:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-group-reroutes-software-updates-through-hacked-network-gear/</loc>
		<lastmod>2025-11-19T11:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-ai-agents-can-be-tricked-into-acting-against-each-other-via-second-order-prompts/</loc>
		<lastmod>2025-11-19T11:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edgestepper-implant-reroutes-dns-queries-to-deploy-malware-via-hijacked-software-updates/</loc>
		<lastmod>2025-11-19T11:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-bekommt-hardwarebeschleunigtes-bitlocker/</loc>
		<lastmod>2025-11-19T11:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vaping-is-everywhere-in-schools-sparking-a-bathroom-surveillance-boom-2/</loc>
		<lastmod>2025-11-19T11:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-achieve-ultra-fast-response-time-in-your-soc/</loc>
		<lastmod>2025-11-19T11:06:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zertifizierungsstrategien-gegen-skills-gaps-in-der-cybersicherheit-warum-zertifizierungen-fur-cybersicherheitsfachkrafte-wichtig-sind/</loc>
		<lastmod>2025-11-19T11:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-email-deliverability-how-to-avoid-spam-folders/</loc>
		<lastmod>2025-11-19T11:13:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/half-of-ransomware-access-due-to-hijacked-vpn-credentials/</loc>
		<lastmod>2025-11-19T11:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-email-deliverability-how-to-avoid-spam-folders-2/</loc>
		<lastmod>2025-11-19T11:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weltweite-ausfalle-wie-cloudflare-das-halbe-internet-lahmgelegt-hat/</loc>
		<lastmod>2025-11-19T11:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/half-of-ransomware-access-due-to-hijacked-vpn-credentials-2/</loc>
		<lastmod>2025-11-19T11:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-operation-wrthug-hijacks-thousands-of-asus-routers/</loc>
		<lastmod>2025-11-19T11:15:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-email-deliverability-how-to-avoid-spam-folders-3/</loc>
		<lastmod>2025-11-19T11:15:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weltweite-ausfalle-wie-cloudflare-das-halbe-internet-lahmgelegt-hat-2/</loc>
		<lastmod>2025-11-19T11:15:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sue-the-hackers-google-sues-over-phishing-as-a-service/</loc>
		<lastmod>2025-11-19T12:07:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-exposure-to-action-how-proactive-identity-monitoring-turns-breached-data-into-defense/</loc>
		<lastmod>2025-11-19T12:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/record-breaking-cloud-incident-brings-outage-through-the-internet/</loc>
		<lastmod>2025-11-19T12:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sue-the-hackers-google-sues-over-phishing-as-a-service-2/</loc>
		<lastmod>2025-11-19T12:08:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bill-largent-on-epic-reads-lifelong-learning-and-empathy/</loc>
		<lastmod>2025-11-19T12:08:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-exposure-to-action-how-proactive-identity-monitoring-turns-breached-data-into-defense-2/</loc>
		<lastmod>2025-11-19T12:08:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-turbine-engineer-tried-to-turn-wind-into-crypto-ends-up-generating-community-service/</loc>
		<lastmod>2025-11-19T12:09:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/record-breaking-cloud-incident-brings-outage-through-the-internet-2/</loc>
		<lastmod>2025-11-19T12:09:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealth-patched-fortiweb-vulnerability-under-active-exploitation-cve-2025-58034/</loc>
		<lastmod>2025-11-19T12:10:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-blames-this-weeks-massive-outage-on-database-issues/</loc>
		<lastmod>2025-11-19T12:11:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealth-patched-fortiweb-vulnerability-under-active-exploitation-cve-2025-58034-2/</loc>
		<lastmod>2025-11-19T12:11:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preemptive-cybersecurity-auf-dem-weg-zur-vorausschauenden-cloud-sicherheit/</loc>
		<lastmod>2025-11-19T12:11:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-blames-this-weeks-massive-outage-on-database-issues-2/</loc>
		<lastmod>2025-11-19T12:12:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-relic-studie-schwerwiegende-it-ausfalle-kosten-deutsche-unternehmen-im-mittel-147-mio-euro-pro-jahr/</loc>
		<lastmod>2025-11-19T12:12:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealth-patched-fortiweb-vulnerability-under-active-exploitation-cve-2025-58034-3/</loc>
		<lastmod>2025-11-19T12:12:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preemptive-cybersecurity-auf-dem-weg-zur-vorausschauenden-cloud-sicherheit-2/</loc>
		<lastmod>2025-11-19T12:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-awareness-week-wie-sich-organisationen-wirksam-vor-betrug-und-phishing-schutzen/</loc>
		<lastmod>2025-11-19T12:13:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-blames-this-weeks-massive-outage-on-database-issues-3/</loc>
		<lastmod>2025-11-19T12:13:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-relic-studie-schwerwiegende-it-ausfalle-kosten-deutsche-unternehmen-im-mittel-147-mio-euro-pro-jahr-2/</loc>
		<lastmod>2025-11-19T12:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overcome-the-myriad-challenges-of-password-management-to-bolster-data-protection/</loc>
		<lastmod>2025-11-19T13:34:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-bei-eurofiber-france/</loc>
		<lastmod>2025-11-19T13:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-netzwerksichtbarkeit-so-wichtig-ist/</loc>
		<lastmod>2025-11-19T13:35:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-integriert-abnormal-ai-zur-erweiterung-der-ebedrohungserkennung-und-abwehr/</loc>
		<lastmod>2025-11-19T13:36:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitymetrics-wins-data-leak-detection-solution-of-the-year-5/</loc>
		<lastmod>2025-11-19T13:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plushdaemon-hackers-unleash-new-malware-in-china-aligned-spy-campaigns/</loc>
		<lastmod>2025-11-19T13:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/application-containment-how-to-use-ringfencing-to-prevent-the-weaponization-of-trusted-software/</loc>
		<lastmod>2025-11-19T13:39:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-dynamik-der-digitalen-souveranitat-europas/</loc>
		<lastmod>2025-11-19T13:47:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cline-bot-ai-agent-vulnerable-to-data-theft-and-code-execution/</loc>
		<lastmod>2025-11-19T13:47:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-man-admits-to-laundering-crypto-stolen-in-230m-heist/</loc>
		<lastmod>2025-11-19T13:47:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-security-saas-plattformen-als-neue-schwachstelle-besser-schutzen/</loc>
		<lastmod>2025-11-19T13:48:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scraping-daten-von-35-milliarden-whatsapp-konten-abgegriffen/</loc>
		<lastmod>2025-11-19T13:48:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-routers-hacked-in-wrthug-campaign/</loc>
		<lastmod>2025-11-19T14:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wrthug-exploits-six-asus-wrt-flaws-to-hijack-tens-of-thousands-of-eol-routers-worldwide/</loc>
		<lastmod>2025-11-19T14:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automating-saas-onboarding-simplifying-and-testing-your-enterprise-sso-flows/</loc>
		<lastmod>2025-11-19T13:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doordash-confirms-data-breach-affecting-users-phone-numbers-and-physical-addresses/</loc>
		<lastmod>2025-11-19T13:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-integriert-cyber-intelligenz-in-copilot-von-microsoft/</loc>
		<lastmod>2025-11-19T14:00:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-claim-largest-leak-ever-after-uncovering-whatsapp-enumeration-flaw/</loc>
		<lastmod>2025-11-19T14:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eschool-news-how-k-12-it-teams-lock-down-qr-based-sso-without-hurting-usability/</loc>
		<lastmod>2025-11-19T15:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obscure-mcp-api-in-comet-browser-breaches-user-trust-enabling-full-device-control-via-ai-browsers/</loc>
		<lastmod>2025-11-19T15:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-nexus-of-risk-and-intelligence-how-vulnerability-informed-hunting-uncovers-what-everything-else-misses/</loc>
		<lastmod>2025-11-19T15:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hidden-api-in-comet-ai-browser-raises-security-red-flags-for-enterprises/</loc>
		<lastmod>2025-11-19T15:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-startup-guardio-nabs-80m-from-ion-crossover-partners/</loc>
		<lastmod>2025-11-19T15:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-new-fortinet-fortiweb-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-11-19T15:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exam-prep-hacked-study-tips-and-tricks-that-really-work/</loc>
		<lastmod>2025-11-19T15:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obscure-mcp-api-in-comet-browser-breaches-user-trust-enabling-full-device-control-via-ai-browsers-2/</loc>
		<lastmod>2025-11-19T15:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-wrthug-campaign-hijacks-thousands-of-endlife-asus-routers/</loc>
		<lastmod>2025-11-19T15:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-gives-govt-agencies-7-days-to-patch-new-fortinet-flaw/</loc>
		<lastmod>2025-11-19T15:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-risks-in-your-devops-stack-data-and-how-to-address-them/</loc>
		<lastmod>2025-11-19T15:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-shinysp1d3r-new-ransomware-as-a-service-created-by-shinyhunters/</loc>
		<lastmod>2025-11-19T15:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-railway-braking-systems-open-to-tampering/</loc>
		<lastmod>2025-11-19T15:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-we-ditched-the-saas-status-quo-for-time-series-telemetry/</loc>
		<lastmod>2025-11-19T15:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2025-msp-cyber-crisis-breaking-free-from-vendor-lock-in-and-reclaiming-profitability/</loc>
		<lastmod>2025-11-19T16:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-issues-fixes-as-fortiweb-takeover-flaw-sees-active-attacks/</loc>
		<lastmod>2025-11-19T16:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-turns-on-its-team-exploiting-agentagent-discovery-via-prompt-injection/</loc>
		<lastmod>2025-11-19T16:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eternidade-stealer-trojan-fuels-aggressive-brazil-cybercrime/</loc>
		<lastmod>2025-11-19T16:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leadership-compass-remote-access-fur-ot-und-ics-warum-secure-remote-access-zum-kern-industrieller-cybersecurity-wird/</loc>
		<lastmod>2025-11-19T16:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-bringt-data-platform-v13-auf-den-markt/</loc>
		<lastmod>2025-11-19T16:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appomni-expands-ai-security-with-agentic-ai-security-for-servicenow/</loc>
		<lastmod>2025-11-19T16:12:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-8-continuous-control-monitoring-solutions/</loc>
		<lastmod>2025-11-19T16:13:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cyera-cro-on-data-security-surge-ai-partner-opportunities-in-2026/</loc>
		<lastmod>2025-11-19T16:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appomni-expands-ai-security-with-agentic-ai-security-for-servicenow-2/</loc>
		<lastmod>2025-11-19T16:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-russian-insurer-facing-widespread-outages-after-cyberattack/</loc>
		<lastmod>2025-11-19T16:13:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-8-continuous-control-monitoring-solutions-2/</loc>
		<lastmod>2025-11-19T16:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cyera-cro-on-data-security-surge-ai-partner-opportunities-in-2026-2/</loc>
		<lastmod>2025-11-19T16:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-russian-insurer-facing-widespread-outages-after-cyberattack-2/</loc>
		<lastmod>2025-11-19T16:14:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rce-vulnerability-in-glob-cli-poses-major-ci-cd-security-risk/</loc>
		<lastmod>2025-11-19T16:14:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rce-vulnerability-in-glob-cli-poses-major-ci-cd-security-risk-2/</loc>
		<lastmod>2025-11-19T16:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appomni-expands-ai-security-with-agentic-ai-security-for-servicenow-3/</loc>
		<lastmod>2025-11-19T16:15:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-zip-vulnerability-is-being-actively-exploited-nhs-england-warns-cve-2025-11001/</loc>
		<lastmod>2025-11-19T16:17:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-issues-emergency-update-for-2b-chrome-users/</loc>
		<lastmod>2025-11-19T16:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-uberall-windows-11-macht-sich-gerade-noch-unbeliebter-als-windows-8/</loc>
		<lastmod>2025-11-19T16:18:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-quick-fortinet-patches-amid-exploitation-of-new-fortiweb-vulnerability/</loc>
		<lastmod>2025-11-19T16:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appomni-delivers-industry-first-real-time-agentic-ai-security-for-servicenow/</loc>
		<lastmod>2025-11-19T16:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seraphic-becomes-the-first-and-only-secure-enterprise-browser-solution-to-protect-electron-based-applications/</loc>
		<lastmod>2025-11-19T17:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-plan-to-scrap-telecom-cyber-rules-draws-congressional-backlash/</loc>
		<lastmod>2025-11-19T17:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blocking-traffic-manipulation-in-aws-starts-with-iam/</loc>
		<lastmod>2025-11-19T17:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitaler-betrug-im-namen-von-ikea-kaufland-media-markt-amazon-und-temu-in-deutschland/</loc>
		<lastmod>2025-11-19T17:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seraphic-becomes-the-first-and-only-secure-enterprise-browser-solution-to-protect-electron-based-applications-2/</loc>
		<lastmod>2025-11-19T17:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-blames-outage-on-internal-configuration-error/</loc>
		<lastmod>2025-11-19T17:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-operation-disrupts-55m-in-cryptocurrency-for-piracy/</loc>
		<lastmod>2025-11-19T17:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisrichtlinie-zentrale-anlaufstelle-fur-cybervorfalle-geplant/</loc>
		<lastmod>2025-11-19T17:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-actively-exploiting-7-zip-symbolic-linkbased-rce-vulnerability-cve-2025-11001/</loc>
		<lastmod>2025-11-19T17:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/python-based-whatsapp-worm-spreads-eternidade-stealer-across-brazilian-devices/</loc>
		<lastmod>2025-11-19T17:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-blames-outage-on-internal-configuration-error-2/</loc>
		<lastmod>2025-11-19T17:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-the-skeleton-keys-a-large-scale-analysis-of-credential-leakage-in-mini-apps/</loc>
		<lastmod>2025-11-19T18:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-microsegmentation-powers-breach-readiness-and-cyber-resilience/</loc>
		<lastmod>2025-11-19T18:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-directory-trust-misclassification-why-old-trusts-look-like-insecure-external-trusts/</loc>
		<lastmod>2025-11-19T18:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-credential-detection-vs-password-policy-enforcement/</loc>
		<lastmod>2025-11-19T18:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-allies-sanction-russian-bulletproof-hosting-firm/</loc>
		<lastmod>2025-11-19T18:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/record-breaking-ddos-attack-against-microsoft-azure-mitigated/</loc>
		<lastmod>2025-11-19T18:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-chips-away-at-north-korean-it-worker-fraud/</loc>
		<lastmod>2025-11-19T18:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-simplification-proposal-would-weaken-gdpr-ai-regulations/</loc>
		<lastmod>2025-11-19T18:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-uk-and-australia-sanction-russian-bulletproof-web-host-used-in-ransomware-attacks/</loc>
		<lastmod>2025-11-19T18:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versicherungen-sind-kein-freifahrtschein-fur-schlechte-cybersicherheit/</loc>
		<lastmod>2025-11-19T18:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeamplatform-v13-soll-der-neue-standard-fur-cyberresilienz-datenschutz-und-ki-gestutzte-intelligenz-werdeb/</loc>
		<lastmod>2025-11-19T18:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-selling-alleged-samsung-medison-data-stolen-in-3rd-party-breach/</loc>
		<lastmod>2025-11-19T18:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-allies-sanction-russian-bulletproof-ransomware-host/</loc>
		<lastmod>2025-11-19T18:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowray-2-0-exploits-ray-vulnerability-to-hijack-ai-clusters/</loc>
		<lastmod>2025-11-19T18:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-contrite-after-worst-outage-since-2019/</loc>
		<lastmod>2025-11-19T18:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-sets-out-plans-to-cut-red-tape-on-digital/</loc>
		<lastmod>2025-11-19T18:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/w3-total-cache-wordpress-plugin-vulnerable-to-php-command-injection/</loc>
		<lastmod>2025-11-19T18:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-bulletproof-hosting-provider-sanctioned-over-ransomware-ties/</loc>
		<lastmod>2025-11-19T18:05:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitaler-omnibus-eu-kommission-verteidigt-lockerungen-beim-datenschutz/</loc>
		<lastmod>2025-11-19T18:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-allies-sanction-russian-bulletproof-hosting-services-for-ransomware-support/</loc>
		<lastmod>2025-11-19T19:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canadian-privacy-regulators-say-schools-share-blame-for-powerschool-hack/</loc>
		<lastmod>2025-11-19T19:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-warns-of-global-rise-in-specialized-cyber-enabled-kinetic-targeting/</loc>
		<lastmod>2025-11-19T19:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-wrthug-hijacks-50000-asus-routers-to-ba%c2%acbuild-global-botnet/</loc>
		<lastmod>2025-11-19T19:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-triggers-42-day-akira-ransomware-attack/</loc>
		<lastmod>2025-11-19T19:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/largest-data-leak-in-history-whatsapp-flaw-exposed-billions-of-users/</loc>
		<lastmod>2025-11-19T19:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-exposes-bulletproof-hosting-operator-linked-to-lockbit-and-evil-corp/</loc>
		<lastmod>2025-11-19T19:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-zip-rce-flaw-cve-2025-11001-actively-exploited-in-attacks-in-the-wild/</loc>
		<lastmod>2025-11-19T19:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-wrthug-hijacks-50000-asus-routers-to-build-a-global-botnet/</loc>
		<lastmod>2025-11-19T20:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critics-scoff-after-microsoft-warns-ai-feature-can-infect-machines-and-pilfer-data/</loc>
		<lastmod>2025-11-19T21:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-operation-traces-55-million-crypto-trail-of-digital-piracy-sites/</loc>
		<lastmod>2025-11-19T21:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/misconfigured-ai-agents-let-attacks-slip-past-controls/</loc>
		<lastmod>2025-11-19T21:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-gemini-3-is-living-up-to-the-hype-and-creating-games-in-one-shot/</loc>
		<lastmod>2025-11-19T21:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-search-is-now-using-ai-to-create-interactive-ui-to-answer-your-questions/</loc>
		<lastmod>2025-11-19T21:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seraphic-becomes-the-first-and-only-secure-enterprise-browser-solution-to-protect-electron-based-applications-3/</loc>
		<lastmod>2025-11-19T21:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obscure-mcp-api-in-comet-browser-breaches-user-trust-enabling-full-device-control-via-ai-browsers-3/</loc>
		<lastmod>2025-11-19T21:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-gentlemen/</loc>
		<lastmod>2025-11-19T21:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-on-fortinet-fortiweb-vulnerability-exploited-in-real-world-attacks/</loc>
		<lastmod>2025-11-19T21:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-plushdaemon-hackers-exploit-edgestepper-tool-to-hijack-legitimate-updates-and-redirect-to-malicious-servers/</loc>
		<lastmod>2025-11-19T21:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seraphic-becomes-the-first-and-only-secure-enterprise-browser-solution-to-protect-electron-based-applications-4/</loc>
		<lastmod>2025-11-19T21:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obscure-mcp-api-in-comet-browser-breaches-user-trust-enabling-full-device-control-via-ai-browsers-4/</loc>
		<lastmod>2025-11-19T21:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-gentlemen-2/</loc>
		<lastmod>2025-11-19T21:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-tuoni-c2-framework-to-stealthily-deploy-in-memory-payloads/</loc>
		<lastmod>2025-11-19T21:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-click-on-captcha-triggers-destructive-akira-ransomware-attack-on-malicious-website/</loc>
		<lastmod>2025-11-19T21:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-tuoni-c2-framework-to-stealthily-deploy-in-memory-payloads-2/</loc>
		<lastmod>2025-11-19T21:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-adds-option-to-report-misidentified-threat-messages/</loc>
		<lastmod>2025-11-19T21:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-click-on-captcha-triggers-destructive-akira-ransomware-attack-on-malicious-website-2/</loc>
		<lastmod>2025-11-19T21:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nova-stealer-targets-macos-users-swaps-legit-apps-to-steal-crypto-wallets/</loc>
		<lastmod>2025-11-19T21:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec-programs-3/</loc>
		<lastmod>2025-11-19T21:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-adds-option-to-report-misidentified-threat-messages-2/</loc>
		<lastmod>2025-11-19T21:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-pay-per-crawl-how-to-turn-ai-agent-traffic-into-revenue/</loc>
		<lastmod>2025-11-19T22:00:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-reintroduce-bill-to-bolster-cybersecurity-at-securities-and-exchange-commission/</loc>
		<lastmod>2025-11-19T22:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-eyes-just-made-life-harder-for-bulletproof-hosting-providers/</loc>
		<lastmod>2025-11-19T22:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/basic-backup-vs-cyber-resilience-critical-differences/</loc>
		<lastmod>2025-11-19T22:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-improve-credential-security/</loc>
		<lastmod>2025-11-19T22:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/factors-that-erode-security-transparency-and-trust-in-the-enterprise/</loc>
		<lastmod>2025-11-19T22:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-simplify-and-secure-the-end-user-experience/</loc>
		<lastmod>2025-11-19T22:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-credshields-and-checkmarx-partner-to-extend-appsec-into-web3-and-smart-contracts/</loc>
		<lastmod>2025-11-19T23:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-secure-com-debuts-ai-native-digital-security-teammate-to-help-lean-security-teams/</loc>
		<lastmod>2025-11-19T23:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-understanding-miniapp-malware-identification-dissection-and-characterization/</loc>
		<lastmod>2025-11-19T23:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fireside-chat-edge-ai-moves-onto-the-silicon-layer-redefining-how-connected-systems-run/</loc>
		<lastmod>2025-11-19T23:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-continents/</loc>
		<lastmod>2025-11-19T23:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-flaw-allowed-discovery-of-the-3-5-billion-mobile-numbers-registered-to-the-platform/</loc>
		<lastmod>2025-11-19T23:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-chronosphere-for-3-3b-boosting-ai-observability/</loc>
		<lastmod>2025-11-19T23:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-classic-anime-ghost-in-the-shell-predicted-the-future-of-cybersecurity-30-years-ago/</loc>
		<lastmod>2025-11-19T23:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridging-the-consumer-trust-gap-in-the-age-of-ai/</loc>
		<lastmod>2025-11-19T23:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-flaw-allowed-discovery-of-the-3-5-billion-mobile-numbers-registered-to-the-platform-2/</loc>
		<lastmod>2025-11-19T23:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/traditional-m365-data-protection-no-longer-enough/</loc>
		<lastmod>2025-11-19T23:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-overcome-latency-in-your-cyber-career/</loc>
		<lastmod>2025-11-19T23:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wired-roundup-dhss-privacy-breach-ai-romantic-affairs-and-google-sues-text-scammers/</loc>
		<lastmod>2025-11-19T23:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sneaky2fa-phaas-kit-now-uses-redteamers-browserthe-browser-attack/</loc>
		<lastmod>2025-11-19T23:04:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-woes-continue-with-another-waf-zero-day-flaw/</loc>
		<lastmod>2025-11-19T23:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/do-national-data-laws-carry-cyber-risks-for-large-orgs/</loc>
		<lastmod>2025-11-19T23:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-overcome-latency-in-your-cyber-career-2/</loc>
		<lastmod>2025-11-19T23:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-attack-surface-how-agents-raise-the-cyber-stakes/</loc>
		<lastmod>2025-11-19T23:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-ai-observability-platform-chronosphere-for-3-35-billion/</loc>
		<lastmod>2025-11-20T00:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-modern-pam-solutions-delivering-value/</loc>
		<lastmod>2025-11-20T00:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-investing-in-advanced-nhidr-systems-justified/</loc>
		<lastmod>2025-11-20T00:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-ai-driven-pam-solutions-powerful/</loc>
		<lastmod>2025-11-20T00:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-impenetrable-ai-driven-security-systems-realistic/</loc>
		<lastmod>2025-11-20T00:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-ai-observability-platform-chronosphere-for-3-35-billion-2/</loc>
		<lastmod>2025-11-20T00:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-ceo-surging-ai-cycle-driving-billion-dollar-acquisitions/</loc>
		<lastmod>2025-11-20T00:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-observability-firm-chronosphere-for-3-35-billion/</loc>
		<lastmod>2025-11-20T00:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitaler-omnibus-eco-setzt-auf-mehr-klarheit-bei-europas-digitalregeln/</loc>
		<lastmod>2025-11-20T00:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-risiken-und-regulierung-beyondtrust-verkundet-it-security-prognosen-fur-2026/</loc>
		<lastmod>2025-11-20T00:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-bitkom-und-numeum-fordern-europas-ablosung-von-einseitiger-abhangigkeit/</loc>
		<lastmod>2025-11-20T00:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fesses-up-to-second-0-day-within-a-week/</loc>
		<lastmod>2025-11-20T00:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/selling-technology-investments-to-the-board-a-strategic-guide-for-cisos-and-cios/</loc>
		<lastmod>2025-11-20T00:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apis-microservices-and-risk-management-firetail-blog/</loc>
		<lastmod>2025-11-20T00:56:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-security-essentials-a-comprehensive-checklist-for-securing-your-api-firetail-blog/</loc>
		<lastmod>2025-11-20T00:56:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-hacks-helped-direct-missile-strikes-in-israel-and-the-red-sea/</loc>
		<lastmod>2025-11-20T00:57:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apis-microservices-and-risk-management-firetail-blog-2/</loc>
		<lastmod>2025-11-20T00:57:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cios-durfen-blinde-flecken-bei-genai-nicht-ubersehen/</loc>
		<lastmod>2025-11-20T05:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-report-zeigt-malware-angriffe-sind-2025-um-131-gestiegen/</loc>
		<lastmod>2025-11-20T05:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attack-surface-management-ein-kaufratgeber/</loc>
		<lastmod>2025-11-20T05:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-ceo-tips-nation-states-to-weaponize-quantum-computing-by-2029/</loc>
		<lastmod>2025-11-20T05:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-uk-australia-sanction-lockbit-gangs-hosting-provider/</loc>
		<lastmod>2025-11-20T05:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-broke-itself-and-a-big-chunk-of-the-internet-with-a-bad-database-query/</loc>
		<lastmod>2025-11-20T05:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-creates-strike-force-to-take-out-se-asian-scam-centers/</loc>
		<lastmod>2025-11-20T05:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-fraud-the-hidden-threat-in-mobile-commerce/</loc>
		<lastmod>2025-11-20T05:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-analyse-digitaler-betrug-im-namen-von-ikea-kaufland-media-markt-amazon-und-temu/</loc>
		<lastmod>2025-11-20T05:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-security-landscape-of-mobile-apps-in-africa/</loc>
		<lastmod>2025-11-20T05:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-reactive-to-ready-a-practical-security-maturity-playbook-for-lean-teams/</loc>
		<lastmod>2025-11-20T06:00:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-fraud-the-hidden-threat-in-mobile-commerce-2/</loc>
		<lastmod>2025-11-20T06:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-it-fails-ot-pays-the-price/</loc>
		<lastmod>2025-11-20T06:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tamperedchef-malware-spreads-via-fake-software-installers-in-ongoing-global-campaign/</loc>
		<lastmod>2025-11-20T06:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-confidence-trap-holding-security-back/</loc>
		<lastmod>2025-11-20T06:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jwts-for-ai-agents-authenticating-non-human-identities/</loc>
		<lastmod>2025-11-20T06:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-password-manager-truly-gdpr-compliant/</loc>
		<lastmod>2025-11-20T07:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluecodeagent-helps-developers-secure-ai-generated-code/</loc>
		<lastmod>2025-11-20T07:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jwts-for-ai-agents-authenticating-non-human-identities-2/</loc>
		<lastmod>2025-11-20T07:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saas-tools-black-friday-deals-for-developer-2025/</loc>
		<lastmod>2025-11-20T07:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-password-manager-truly-gdpr-compliant-2/</loc>
		<lastmod>2025-11-20T07:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluecodeagent-helps-developers-secure-ai-generated-code-2/</loc>
		<lastmod>2025-11-20T07:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saas-tools-black-friday-deals-for-developer-2025-2/</loc>
		<lastmod>2025-11-20T07:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angeblich-interne-daten-gestohlen-akira-droht-mit-daten-leak-von-apache-openoffice/</loc>
		<lastmod>2025-11-20T07:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angeblich-interne-daten-gestohlen-akira-droht-mit-daten-leak-von-apache-openoffice-2/</loc>
		<lastmod>2025-11-20T07:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-play-stores-privacy-practices-still-confuse-android-users/</loc>
		<lastmod>2025-11-20T07:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saas-black-friday-deals-for-developer-2025/</loc>
		<lastmod>2025-11-20T07:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-advantages-of-datacenter-proxies-for-large-scale-data-collection/</loc>
		<lastmod>2025-11-20T07:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-warnung-phishing-welle-mit-ikea-amazon-und-temu/</loc>
		<lastmod>2025-11-20T08:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/selling-to-the-ciso-an-open-letter-to-the-cybersecurity-industry/</loc>
		<lastmod>2025-11-20T08:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saas-black-friday-deals-for-developer-2025-2/</loc>
		<lastmod>2025-11-20T08:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-asset-disposal-nachhaltigkeit-sicherheit-und-versteckte-werte-freisetzen/</loc>
		<lastmod>2025-11-20T08:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-advantages-of-datacenter-proxies-for-large-scale-data-collection-2/</loc>
		<lastmod>2025-11-20T08:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-akira-playbook-how-ransomware-groups-are-weaponizing-mfa-fatigue/</loc>
		<lastmod>2025-11-20T09:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobile-app-platforms-dont-let-database-security-come-back-to-bite-you/</loc>
		<lastmod>2025-11-20T09:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-fuhrt-umfragen-in-den-chats-ein/</loc>
		<lastmod>2025-11-20T09:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-twonky-server-flaws-let-hackers-bypass-login-protection/</loc>
		<lastmod>2025-11-20T09:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-akira-playbook-how-ransomware-groups-are-weaponizing-mfa-fatigue-2/</loc>
		<lastmod>2025-11-20T09:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-ai-enhanced-cyber-scams-how-genai-empowers-criminals/</loc>
		<lastmod>2025-11-20T09:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobile-app-platforms-dont-let-database-security-come-back-to-bite-you-2/</loc>
		<lastmod>2025-11-20T09:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-2-3-million-attacks-on-palo-alto-globalprotect-vpn-portals/</loc>
		<lastmod>2025-11-20T09:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-hybrid-threat-actors-digital-meets-physical/</loc>
		<lastmod>2025-11-20T09:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt-group-exploits-dll-sideloading-to-breach-government-and-media-targets/</loc>
		<lastmod>2025-11-20T09:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ollama-flaws-let-hackers-run-any-code-using-malicious-model-files/</loc>
		<lastmod>2025-11-20T09:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-issues-new-guidance-to-help-isps-and-defenders-stop-malicious-activity/</loc>
		<lastmod>2025-11-20T09:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-2-3-million-attacks-on-palo-alto-globalprotect-vpn-portals-2/</loc>
		<lastmod>2025-11-20T09:04:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-detail-rhadamanthys-loaders-advanced-anti-sandboxing-and-anti-av-emulation-techniques/</loc>
		<lastmod>2025-11-20T09:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-zip-rce-vulnerability-actively-exploited-by-hackers/</loc>
		<lastmod>2025-11-20T09:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-als-fundament-identitaten-zentral-schutzen-cyber-resilienz-starken/</loc>
		<lastmod>2025-11-20T09:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-wird-ausgenutzt-angreifer-attackieren-7-zip-nutzer/</loc>
		<lastmod>2025-11-20T09:06:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-mapped-ship-ais-data-days-before-real-world-missile-strike-attempt/</loc>
		<lastmod>2025-11-20T09:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-vs-ai-why-deepfake-detection-alone-wont-protect-your-enterprise/</loc>
		<lastmod>2025-11-20T09:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spacenet-kommentiert-apply-ai-europas-strategie-fur-eine-souverane-und-wettbewerbsfahige-ki-zukunft/</loc>
		<lastmod>2025-11-20T09:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-444-were-sorry-wait-did-a-company-actually-say-that/</loc>
		<lastmod>2025-11-20T10:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-dgx-spark-software-update-mehr-leistung-und-viele-verbesserungen-fur-peripherie/</loc>
		<lastmod>2025-11-20T11:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-enabled-kinetic-targeting-iran-linked-actor-uses-cyber-operations-to-support-physical-attacks/</loc>
		<lastmod>2025-11-20T11:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-444-were-sorry-wait-did-a-company-actually-say-that-2/</loc>
		<lastmod>2025-11-20T11:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-the-rise-of-ai-cisco-sounds-an-urgent-alarm-about-the-risks-of-aging-tech/</loc>
		<lastmod>2025-11-20T11:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-dgx-spark-software-update-mehr-leistung-und-viele-verbesserungen-fur-peripherie-2/</loc>
		<lastmod>2025-11-20T11:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-enabled-kinetic-targeting-iran-linked-actor-uses-cyber-operations-to-support-physical-attacks-2/</loc>
		<lastmod>2025-11-20T11:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-threat-android-malware-sturnus-steals-signal-whatsapp-messages/</loc>
		<lastmod>2025-11-20T11:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/40-of-firms-to-be-hit-by-shadow-ai-security-incidents/</loc>
		<lastmod>2025-11-20T11:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-its-latest-gpt-5-1-codex-can-code-independently-for-hours/</loc>
		<lastmod>2025-11-20T11:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-neue-wahrung-der-cyberresilienz-time-to-recovery-statt-time-to-detection/</loc>
		<lastmod>2025-11-20T11:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-us-and-australia-sanction-russian-bulletproof-hoster-media-land/</loc>
		<lastmod>2025-11-20T11:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phake-phishing-phundamental-oder-pherruckt/</loc>
		<lastmod>2025-11-20T11:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeamplatform-v13-soll-der-neue-standard-fur-cyberresilienz-datenschutz-und-ki-gestutzte-intelligenz-werden/</loc>
		<lastmod>2025-11-20T12:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wind-farm-worker-sentenced-after-turning-turbines-into-a-secret-crypto-mine/</loc>
		<lastmod>2025-11-20T12:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-kit-sees-massive-surge-in-malicious-activity-amid-mystery-traffic-flood/</loc>
		<lastmod>2025-11-20T12:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-und-souveranitat-eu-data-act-warum-europas-gesundheitsdaten-noch-nicht-souveran-sind/</loc>
		<lastmod>2025-11-20T12:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-softwareupdates-cyberspione-verteilen-malware-uber-manipulierten-dns-traffic/</loc>
		<lastmod>2025-11-20T12:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-mixer-founders-sent-to-prison-for-laundering-over-237-million/</loc>
		<lastmod>2025-11-20T12:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sturnus-android-trojan-quietly-captures-encrypted-chats-and-hijacks-devices/</loc>
		<lastmod>2025-11-20T13:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-wird-ein-schlusseljahr-bei-der-weichenstellung-fur-vida-e-rechnung-und-ki-agenten/</loc>
		<lastmod>2025-11-20T13:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-strengthens-cyber-defense-as-enisa-becomes-cve-root-2/</loc>
		<lastmod>2025-11-20T13:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tanium-setzt-neue-ki-masstabe-fur-autonome-it-und-ganzheitliche-cyber-resilienz/</loc>
		<lastmod>2025-11-20T13:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ssl-certificate-and-sitelock-security-which-one-do-you-need/</loc>
		<lastmod>2025-11-20T13:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinalinked-plushdaemon-hijacks-dns-via-edgestepper-to-weaponize-software-updates/</loc>
		<lastmod>2025-11-20T13:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-ways-cisos-can-win-over-their-boards-this-budget-season/</loc>
		<lastmod>2025-11-20T13:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spacenet-unterstutzt-europaische-initiative-zur-digitalen-souveranitat/</loc>
		<lastmod>2025-11-20T13:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyble-and-bocra-sign-mou-to-strengthen-botswanas-national-cybersecurity-framework/</loc>
		<lastmod>2025-11-20T13:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-strengthens-cyber-defense-as-enisa-becomes-cve-root/</loc>
		<lastmod>2025-11-20T13:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comet-browser-flaw-lets-hidden-api-run-commands-on-users-devices/</loc>
		<lastmod>2025-11-20T13:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ctm360-exposes-a-global-whatsapp-hijacking-campaign-hackonchat/</loc>
		<lastmod>2025-11-20T13:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-7-zip-vulnerability-cve-2025-11001-prompts-nhs-cyber-alert/</loc>
		<lastmod>2025-11-20T14:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutzte-cps-asset-bibliothek-fur-transparenz-und-sicherheit/</loc>
		<lastmod>2025-11-20T14:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-arbeitet-mit-microsoft-zusammen-um-ki-sicherheit-fur-copilot-studio-auf-unternehmensniveau-bereitzustellen/</loc>
		<lastmod>2025-11-20T14:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsmanagement-mit-ki-agenten-sollte-ein-schulterschluss-von-mensch-und-maschine-sein/</loc>
		<lastmod>2025-11-20T14:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-eternidade-stealer-uses-whatsapp-to-steal-banking-data/</loc>
		<lastmod>2025-11-20T14:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-7-zip-vulnerability-cve-2025-11001-prompts-nhs-cyber-alert-2/</loc>
		<lastmod>2025-11-20T14:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-digitstealer-malware-poses-as-dynamiclake-targets-apple-silicon-m2-m3-devices/</loc>
		<lastmod>2025-11-20T14:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tv-streaming-piracy-service-with-26m-yearly-visits-shut-down/</loc>
		<lastmod>2025-11-20T14:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-0-days-linkedin-spies-crypto-crimes-iot-flaws-and-new-malware-waves/</loc>
		<lastmod>2025-11-20T14:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banking-trojaner-neue-android-malware-liest-verschlusselte-chats-mit/</loc>
		<lastmod>2025-11-20T14:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-digitstealer-malware-poses-as-dynamiclake-targets-apple-silicon-m2-m3-devices-2/</loc>
		<lastmod>2025-11-20T14:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-usps-and-e-z-pass-texts-and-websites/</loc>
		<lastmod>2025-11-20T15:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-exploit-fur-ai-browser-comet-entdeckt/</loc>
		<lastmod>2025-11-20T15:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sind-phishing-tests-sinnvoll-oder-kontraproduktiv/</loc>
		<lastmod>2025-11-20T15:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-eternidade-trojan-self-propagates-through-brazil/</loc>
		<lastmod>2025-11-20T15:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-breaches-impact-almost-all-firms-globally-bluevoyant-reveals/</loc>
		<lastmod>2025-11-20T15:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-usps-and-e-z-pass-texts-and-websites-2/</loc>
		<lastmod>2025-11-20T15:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-cyber-versicherungen-solide-sicherheitsmasnahmen-nicht-ersetzen-konnen/</loc>
		<lastmod>2025-11-20T15:03:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auf-spurensuche-im-rechenzentrum-erzahl-uns-deine-it-true-crime-story/</loc>
		<lastmod>2025-11-20T15:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-macht-phishing-mails-gefahrlich-echt-so-schutzt-du-dich-vor-dem-cyberangriff/</loc>
		<lastmod>2025-11-20T15:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-anna-gomez-believes-the-fcc-is-letting-telecoms-off-easy-after-salt-typhoon/</loc>
		<lastmod>2025-11-20T15:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-beyond-containers-identity-and-agent-security-lessons-from-kubecon%c2%af2025/</loc>
		<lastmod>2025-11-20T16:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/education-boards-left-gates-wide-open-for-powerschool-mega-breach-say-watchdogs/</loc>
		<lastmod>2025-11-20T16:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samourai-wallet-crypto-mixers-co-founders-sentenced-to-prison/</loc>
		<lastmod>2025-11-20T16:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turn-your-windows-11-migration-into-a-security-opportunity/</loc>
		<lastmod>2025-11-20T16:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-blacklists-s-t-a-l-k-e-r-game-developer-accusing-it-of-aiding-ukraines-war-effort/</loc>
		<lastmod>2025-11-20T16:05:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apicontext-introduces-mcp-server-performance-monitoring-to-ensure-fast-and-reliable-ai-workflows/</loc>
		<lastmod>2025-11-20T16:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/d-link-warns-of-new-rce-flaws-in-end-of-life-dir-878-routers/</loc>
		<lastmod>2025-11-20T16:06:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-blacklists-s-t-a-l-k-e-r-game-developer-accusing-it-of-aiding-ukraines-war-effort-2/</loc>
		<lastmod>2025-11-20T16:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-gap-in-perplexitys-comet-browser-exposed-users-to-system-level-attacks/</loc>
		<lastmod>2025-11-20T16:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-new-guidance-on-bulletproof-hosting-threat/</loc>
		<lastmod>2025-11-20T16:24:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-digital-footprints-understanding-your-online-identity/</loc>
		<lastmod>2025-11-20T17:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-command-injection-flaw-in-fortinet-fortiweb-is-under-exploitation/</loc>
		<lastmod>2025-11-20T17:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-ceo-george-kurtz-on-aws-falcon-flex-and-incredibly-important-partner-moves/</loc>
		<lastmod>2025-11-20T17:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-crowdstrike-mastered-the-comeback-analysis/</loc>
		<lastmod>2025-11-20T17:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nso-seeks-to-overturn-whatsapp-case-saying-it-is-catastrophic-for-the-spyware-maker/</loc>
		<lastmod>2025-11-20T17:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zehntausende-asus-router-sind-unter-fremder-kontrolle/</loc>
		<lastmod>2025-11-20T17:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-accuses-rival-netgear-of-smear-campaign-over-alleged-china-ties/</loc>
		<lastmod>2025-11-20T17:03:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swedish-welfare-authorities-suspend-discriminatory-ai-model/</loc>
		<lastmod>2025-11-20T17:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls/</loc>
		<lastmod>2025-11-20T17:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zehntausende-asus-router-sind-unter-fremder-kontrolle-2/</loc>
		<lastmod>2025-11-20T17:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc2891-money-mule-network-reveals-full-scope-of-atm-fraud-operation/</loc>
		<lastmod>2025-11-20T17:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-accuses-rival-netgear-of-smear-campaign-over-alleged-china-ties-2/</loc>
		<lastmod>2025-11-20T17:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chronosphere-palo-alto-networks-kauft-im-ki-agenten-bereich-zu/</loc>
		<lastmod>2025-11-20T17:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copilot-ki-in-windows-11-konnte-malware-installieren/</loc>
		<lastmod>2025-11-20T17:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chronosphere-palo-alto-networks-kauft-im-ki-agenten-bereich-zu-2/</loc>
		<lastmod>2025-11-20T17:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-and-interpreting-inconsistencies-in-app-behaviors/</loc>
		<lastmod>2025-11-20T18:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/regulatory-landscape-dmarc-gdpr-dora-what-businesses-need-to-know-in-2025/</loc>
		<lastmod>2025-11-20T18:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-eliminates-cybersecurity-requirements-for-telecom-companies/</loc>
		<lastmod>2025-11-20T18:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-spikes-biden-era-cyber-regulations-prompted-by-salt-typhoon-telecom-breaches/</loc>
		<lastmod>2025-11-20T18:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uks-new-cybersecurity-bill-takes-aim-at-ransomware-gangs-and-state-backed-hackers/</loc>
		<lastmod>2025-11-20T18:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-and-interpreting-inconsistencies-in-app-behaviors-2/</loc>
		<lastmod>2025-11-20T18:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fired-techie-admits-sabotaging-ex-employer-causing-862k-in-damage/</loc>
		<lastmod>2025-11-20T18:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-pledges-more-security-in-network-equipment/</loc>
		<lastmod>2025-11-20T18:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/globalprotect-vpn-portals-probed-with-2-3-million-scan-sessions/</loc>
		<lastmod>2025-11-20T18:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-investigates-customer-data-theft-via-gainsight-breach/</loc>
		<lastmod>2025-11-20T18:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowray-2-0-exploits-unpatched-ray-flaw-to-build-self-spreading-gpu-cryptomining-botnet/</loc>
		<lastmod>2025-11-20T18:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fired-techie-admits-sabotaging-ex-employer-causing-862k-in-damage-2/</loc>
		<lastmod>2025-11-20T18:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-pledges-more-security-in-network-equipment-2/</loc>
		<lastmod>2025-11-20T18:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tsundere-botnet-expands-using-game-lures-and-ethereum-based-c2-on-windows/</loc>
		<lastmod>2025-11-20T18:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/techstrong-group-and-digicert-unveil-the-quantum-security-25-to-spotlight-leaders-shaping-the-future-of-quantum-security/</loc>
		<lastmod>2025-11-20T19:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-android-malware-can-capture-private-messages-researchers-warn/</loc>
		<lastmod>2025-11-20T19:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-blanks-out-bsods-on-public-displays-with-new-digital-signage-mode/</loc>
		<lastmod>2025-11-20T19:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-says-it-breached-brazilian-energy-giant-petrobras/</loc>
		<lastmod>2025-11-20T19:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-samourai-execs-crypto-ceo-sentenced/</loc>
		<lastmod>2025-11-20T19:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-flaw-enables-massive-scraping-of-3-5-billion-user-accounts/</loc>
		<lastmod>2025-11-20T19:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matrix-push-c2-tool-hijacks-browser-notifications/</loc>
		<lastmod>2025-11-20T19:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kapitalmarkttag-nokia-kundigt-verkauf-von-grosen-konzernteilen-an/</loc>
		<lastmod>2025-11-20T19:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-criticized-for-silent-patching-after-disclosing-second-zero-day-vulnerability-in-same-equipment/</loc>
		<lastmod>2025-11-20T20:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-senate-intel-dem-warns-of-catastrophic-cyber-consequences-of-trump-admin-national-security-firings-politicization/</loc>
		<lastmod>2025-11-20T20:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/its-not-personal-its-just-business/</loc>
		<lastmod>2025-11-20T20:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-says-some-of-its-customers-data-was-accessed-after-gainsight-breach/</loc>
		<lastmod>2025-11-20T20:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-criticized-for-silent-patching-after-disclosing-second-zero-day-vulnerability-in-same-equipment-2/</loc>
		<lastmod>2025-11-20T20:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm-generated-malware-is-improving-but-dont-expect-autonomous-attacks-tomorrow/</loc>
		<lastmod>2025-11-20T20:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coordinated-sanctions-hit-russian-bulletproof-hosting-providers-enabling-top-ransomware-ops/</loc>
		<lastmod>2025-11-20T20:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-agentic-ai-disrupts-security-for-better-or-worse/</loc>
		<lastmod>2025-11-20T20:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-claims-to-steal-2-3tb-data-from-italian-rail-group-almavia/</loc>
		<lastmod>2025-11-20T20:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-hitchhiking-vaccine-enhancing-botnet-remediation-with-remote-code-deployment-reuse/</loc>
		<lastmod>2025-11-20T21:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-changing-threat-landscape-for-retailers-why-is-data-security-working-harder-than-last-year/</loc>
		<lastmod>2025-11-20T21:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-hitchhiking-vaccine-enhancing-botnet-remediation-with-remote-code-deployment-reuse-2/</loc>
		<lastmod>2025-11-20T21:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-salesforce-linked-data-breach-has-shinyhunters-fingerprints-all-over-it/</loc>
		<lastmod>2025-11-20T21:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-changing-threat-landscape-for-retailers-why-is-data-security-working-harder-than-last-year-2/</loc>
		<lastmod>2025-11-20T21:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-finds-bias-triggers-that-weaken-deepseek-r1-code-safety/</loc>
		<lastmod>2025-11-20T21:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tsundere-botnet-targets-windows-linux-macos-via-node-js-packages/</loc>
		<lastmod>2025-11-20T21:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-salesforce-linked-data-breach-has-shinyhunters-fingerprints-all-over-it-2/</loc>
		<lastmod>2025-11-20T21:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-finds-bias-triggers-that-weaken-deepseek-r1-code-safety-2/</loc>
		<lastmod>2025-11-20T21:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samourai-wallet-founders-jailed-for-237m-crypto-laundering/</loc>
		<lastmod>2025-11-20T21:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sturnus-malware-hijacks-signal-and-whatsapp-taking-full-device-control/</loc>
		<lastmod>2025-11-20T21:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samourai-wallet-founders-jailed-for-237m-crypto-laundering-2/</loc>
		<lastmod>2025-11-20T21:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-users-to-active-attacks-on-chrome-0-day-vulnerability/</loc>
		<lastmod>2025-11-20T21:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sturnus-malware-hijacks-signal-and-whatsapp-taking-full-device-control-2/</loc>
		<lastmod>2025-11-20T21:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-users-to-active-attacks-on-chrome-0-day-vulnerability-2/</loc>
		<lastmod>2025-11-20T21:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-ransomware-variants-exploit-amazon-s3-misconfigurations/</loc>
		<lastmod>2025-11-20T21:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tamperedchef-campaign-exploits-everyday-apps-to-deploy-malware-and-enable-remote-access/</loc>
		<lastmod>2025-11-20T21:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-ransomware-variants-exploit-amazon-s3-misconfigurations-2/</loc>
		<lastmod>2025-11-20T21:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samourai-wallet-founders-jailed-for-237m-crypto-laundering-3/</loc>
		<lastmod>2025-11-20T21:05:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tamperedchef-campaign-exploits-everyday-apps-to-deploy-malware-and-enable-remote-access-2/</loc>
		<lastmod>2025-11-20T21:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-hacking-operation-wrthug-compromises-thousands-of-asus-routers-worldwide/</loc>
		<lastmod>2025-11-20T21:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pi-gpt-tool-turns-raspberry-pi-into-a-chatgpt-powered-smart-device/</loc>
		<lastmod>2025-11-20T21:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-sanction-russia-based-bulletproof-hosting-provider-for-aiding-ransomware/</loc>
		<lastmod>2025-11-20T21:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-hacking-operation-wrthug-compromises-thousands-of-asus-routers-worldwide-2/</loc>
		<lastmod>2025-11-20T21:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pi-gpt-tool-turns-raspberry-pi-into-a-chatgpt-powered-smart-device-2/</loc>
		<lastmod>2025-11-20T21:07:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/milvus-proxy-flaw-lets-attackers-forge-headers-and-skip-authorization/</loc>
		<lastmod>2025-11-20T21:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-sanction-russia-based-bulletproof-hosting-provider-for-aiding-ransomware-2/</loc>
		<lastmod>2025-11-20T21:08:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-50165-critical-flaw-in-windows-graphics-component/</loc>
		<lastmod>2025-11-20T21:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sturnus-new-android-banking-trojan-targets-whatsapp-telegram-and-signal/</loc>
		<lastmod>2025-11-20T22:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-cloudflare-outage-root-cause/</loc>
		<lastmod>2025-11-20T22:00:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-warns-nation-state-hackers-tying-cyber-attacks-to-real-world-strikes/</loc>
		<lastmod>2025-11-20T22:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 02e2791ee61899373c056ea4ab064627; Queries for sitemap: 3; Total queries: 88; Seconds: 4.13; Memory for sitemap: 1KB; Total memory: 44MB -->
